


default search action
5th CSCML 2021: Beer-Sheva, Israel
- Shlomi Dolev, Oded Margalit, Benny Pinkas, Alexander A. Schwarzmann

:
Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings. Lecture Notes in Computer Science 12716, Springer 2021, ISBN 978-3-030-78085-2 - Ilaria Chillotti, Marc Joye, Pascal Paillier:

Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks. 1-19 - Hariom, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla:

Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features. 20-37 - Thijs Veugen, Bart Kamphorst

, Natasja van de L'Isle, Marie Beth van Egmond:
Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent. 38-51 - Samanvaya Panda:

Principal Component Analysis Using CKKS Homomorphic Scheme. 52-70 - Michael Berlin

, Oded Margalit
, Gera Weiss
:
DepthStAr: Deep Strange Arguments Detection. 71-85 - Aneet Kumar Dutta, Rohit Negi

, Sandeep Kumar Shukla:
Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems. 86-93 - Nitesh Emmadi, Imtiyazuddin Shaik, Harshal Tupsamudre, Harika Narumanchi, Rajan Mindigal Alasingara Bhattachar, Sachin Premsukh Lodha:

Privacy-Preserving Password Strength Meters with FHE. 94-103 - Mor Soffer, Ofer Hadar

, Naftali Lazarovitch:
Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning. 104-113 - Iddo Bentov, Pavel Hubácek

, Tal Moran
, Asaf Nadler
:
Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies. 114-127 - Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:

Game of Drones - Detecting Spying Drones Using Time Domain Analysis. 128-144 - Eyal Nussbaum, Michael Segal:

Privacy Vulnerability of NeNDS Collaborative Filtering. 145-152 - Assaf Wagner, Rami Puzis

:
Lawful Interception in WebRTC Peer-To-Peer Communication. 153-170 - Lukasz Krzywiecki

, Miroslaw Kutylowski, Rafal Rothenberger, Bartosz Drzazga
:
Hierarchical Ring Signatures Immune to Randomness Injection Attacks. 171-186 - Sergey Frenkel:

Theoretical Aspects of a Priori On-Line Assessment of Data Predictability in Applied Tasks. 187-195 - Dor Bitan, Shlomi Dolev:

Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement - (Extended Abstract). 196-204 - Igor Vinokur, David Tolpin:

Warped Input Gaussian Processes for Time Series Forecasting. 205-220 - Shlomi Dolev, Matan Liber:

History Binding Signature - (Extended Abstract). 221-229 - Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:

Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis. 230-243 - Rami Ailabouni, Orr Dunkelman, Sara Bitan:

DNS-Morph: UDP-Based Bootstrapping Protocol for Tor. 244-265 - Yefim Dinitz, Shlomi Dolev, Manish Kumar

:
Polynomial Time k-Shortest Multi-criteria Prioritized and All-Criteria-Disjoint Paths - (Extended Abstract). 266-274 - Nir Drucker

, Shay Gueron
, Dusan Kostic
:
Binding BIKE Errors to a Key Pair. 275-281 - Jakub Klemsa:

Fast and Error-Free Negacyclic Integer Convolution Using Extended Fourier Transform. 282-300 - Frank Blom, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede:

Efficient Secure Ridge Regression from Randomized Gaussian Elimination. 301-316 - Philip Derbeko, Shlomi Dolev:

PolyDNN Polynomial Representation of NN for Communication-Less SMPC Inference. 317-324 - Yakov Vainshtein, Ehud Gudes:

Use of Blockchain for Ensuring Data Integrity in Cloud Databases. 325-335 - Bruce Schneier:

Invited Talk: The Coming AI Hackers. 336-360 - Leonid Reyzin, Adam D. Smith, Sophia Yakoubov

:
Turning HATE into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC. 361-378 - Akif Patel, Moti Yung:

Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance. 379-396 - Dorel Yaffe, Danny Hendler:

Early Detection of In-Memory Malicious Activity Based on Run-Time Environmental Features. 397-404 - Donald Beaver

:
Software Integrity and Validation Using Cryptographic Composability and Computer Vision. 405-413 - David Heath, Vladimir Kolesnikov, Jiahui Lu:

Efficient Generic Arithmetic for KKW - Practical Linear MPC-in-the-Head NIZK on Commodity Hardware Without Trusted Setup. 414-431 - Kyle Haefner

, Indrakshi Ray
:
Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method. 432-450 - Byunggu Yu

, Junwhan Kim
:
Using a Neural Network to Detect Anomalies Given an N-gram Profile. 451-466 - Foto N. Afrati, Shlomi Dolev, Shantanu Sharma, Jeffrey D. Ullman:

Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations. 467-486 - Shlomi Dolev, Stav Doolman:

Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM (Extended Abstract). 487-496 - Nadav Voloch

, Ehud Gudes, Nurit Gal-Oz
:
Implementing GDPR in Social Networks Using Trust and Context. 497-503

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














