


default search action
6th CSCML 2022: Be'er Sheva, Israel
- Shlomi Dolev, Jonathan Katz, Amnon Meisels:

Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings. Lecture Notes in Computer Science 13301, Springer 2022, ISBN 978-3-031-07688-6 - Marc Joye, Pascal Paillier:

Blind Rotation in Fully Homomorphic Encryption with Extended Keys. 1-18 - Oshri Barazani, David Tolpin:

Monitoring Time Series with Missing Values: A Deep Probabilistic Approach. 19-28 - Hen Hayoon, Yossi Oren

:
Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling. 29-46 - Sneha Chauhan

, Sugata Gangopadhyay:
Design of Intrusion Detection System Based on Logical Analysis of Data (LAD) Using Information Gain Ratio. 47-65 - Dina Barak-Pelleg

, Daniel Berend
:
Simulating a Coupon Collector. 66-77 - Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:

On the Undecidability of the Panopticon Detection Problem. 78-87 - Thijs Veugen

, Bart Kamphorst
, Michiel Marcus
:
Privacy-Preserving Contrastive Explanations with Local Foil Trees. 88-98 - Nir Drucker

, Tomer Pelleg
:
Timing Leakage Analysis of Non-constant-time NTT Implementations with Harvey Butterflies. 99-117 - Sergey Frenkel:

Predicting the Direction of Changes in the Values of Time Series for Relatively Small Training Samples. 118-134 - Asa Bornstein

, Amir Rubin
, Danny Hendler
:
Machine-Learning Based Objective Function Selection for Community Detection. 135-152 - Daniel Berend, Shlomi Dolev, Manish Kumar

:
Randomness for Randomness Testing. 153-161 - Dimiter Avresky, Dobrin Dobrev:

Botnet Attack Identification Based on SDN. 162-169 - Yoram Segal

, Ofer Hadar
:
Setting Up an Anonymous Gesture Database as Well as Enhancing It with a Verbal Script Simulator for Rehabilitation Applications. 170-179 - Nadav Voloch

, Ehud Gudes, Nurit Gal-Oz, Rotem Mitrany, Ofri Shani, Maayan Shoel:
Fake News Detection in Social Networks Using Machine Learning and Trust. 180-188 - Nimrod Gradus, Asaf Cohen, Erez Biton, Omer Gurwitz:

Reinforcement Based User Scheduling for Cellular Communications. 189-207 - Sreejit Chaudhury, Ajeet Kumar, Subhamoy Maitra, Somjit Roy

, Sourav Sen Gupta:
A Heuristic Framework to Search for Approximate Mutually Unbiased Bases. 208-223 - Shay Gueron

:
Counter Mode for Long Messages and a Long Nonce. 224-231 - Yarden Rotem, Nathaniel Shimoni, Lior Rokach, Bracha Shapira

:
Transfer Learning for Time Series Classification Using Synthetic Data Generation. 232-246 - Shlomi Dolev, Ehud Gudes, Hannah Yair:

Non-stopping Junctions via Traffic Scheduling. 247-258 - Benjamin Azaria, Lee-Ad Gottlieb:

Predicting Subscriber Usage: Analyzing Multidimensional Time-Series Using Convolutional Neural Networks. 259-269 - Isfaque Al Kaderi Tuhin, Peter Loh, Zhengkui Wang:

Smart Cybercrime Classification for Digital Forensics with Small Datasets. 270-280 - Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C. Kao, Vladimir Kolesnikov, Abrahim Ladha, Nicholas D. Pattengale:

Auditable, Available and Resilient Private Computation on the Blockchain via MPC. 281-299 - Novak Boskov, Naor Radami, Trishita Tiwari, Ari Trachtenberg:

Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting. 300-317 - Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico:

Mutual Accountability Layer: Accountable Anonymity Within Accountable Trust. 318-336 - Panos Kampanakis, Michael G. Kallitsis:

Faster Post-Quantum TLS Handshakes Without Intermediate CA Certificates. 337-355 - Rajnish Kumar

, Shlomi Arnon
:
Enhancing Cybersecurity of Satellites at Sub-THz Bands. 356-365 - Samanvaya Panda:

Polynomial Approximation of Inverse sqrt Function for FHE. 366-376 - Aviad Elyashar, Jorge Bendahan, Rami Puzis:

Detecting Clickbait in Online Social Media: You Won't Believe How We Did It. 377-387 - John Andrews, Michele Ciampi, Vassilis Zikas:

Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum. 388-407 - Brett Hemenway Falk, Rohit Nema

, Rafail Ostrovsky:
A Linear-Time 2-Party Secure Merge Protocol. 408-427 - Michele Ciampi, Muhammad Ishaq

, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas:
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker. 428-446 - Karim Eldefrawy, Tancrède Lepoint, Laura Tam:

In-App Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms. 447-467 - Vasyl Pihur, Aleksandra Korolova

, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, Ruogu Zeng:
Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Model from Enormous Crowds. 468-486 - Pablo Kogan, Tamir Tassa

, Tal Grinshpoun
:
Privacy Preserving DCOP Solving by Mediation. 487-498 - Shlomi Dolev, Ehud Gudes, Erez Segev, Jeffrey D. Ullman, Grisha Weintraub

:
BFLUT Bloom Filter for Private Look Up Tables. 499-505

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














