


default search action
7th CSCML 2023: Be'er Sheva, Israel
- Shlomi Dolev

, Ehud Gudes
, Pascal Paillier:
Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings. Lecture Notes in Computer Science 13914, Springer 2023, ISBN 978-3-031-34670-5 - Yehuda Afek, Anat Bremler-Barr, Dor Israeli, Alon Noy:

Localhost Detour from Public to Private Networks. 1-17 - Madhurima Mukhopadhyay, Palash Sarkar:

Pseudo-random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation. 18-31 - Berry Schoenmakers, Toon Segers:

Efficient Extended GCD and Class Groups from Secure Integer Arithmetic. 32-48 - Ilan Komargodski

, Yoav Tamir:
On Distributed Randomness Generation in Blockchains. 49-64 - Nir Drucker

, Itamar Zimerman
:
Efficient Skip Connections Realization for Secure Inference on Encrypted Data. 65-73 - Asaf Cohen, Pawel Cyprys

, Shlomi Dolev:
Single Instance Self-masking via Permutations - (Preliminary Version). 74-84 - Divya Mishra

, Itai Dror
, Ofer Hadar
, Daniel Choukroun
, Shimrit Maman
, Dan G. Blumberg
:
A Fusion-Based Framework for Unsupervised Single Image Super-Resolution. 85-95 - Ehud Aharoni

, Nir Drucker
, Eyal Kushnir
, Ramy Masalha
, Hayim Shaul
:
Generating One-Hot Maps Under Encryption. 96-116 - Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey:

Building Blocks for LSTM Homomorphic Evaluation with TFHE. 117-134 - Stefano Longari, Carlo Alberto Pozzoli, Alessandro Nichelini, Michele Carminati

, Stefano Zanero:
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks. 135-150 - Deborah Novick, Mark Last

:
Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan, and Israel. 151-169 - Klaas Meinke

, Tamis Achilles van der Laan
, Tiberiu Iancu
, Ceyhun Cakir
:
A Bag of Tokens Neural Network to Predict Webpage Age. 170-180 - Subhabrata Samajder, Palash Sarkar:

Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations. 181-187 - Riyanka Jena, Priyanka Singh

, Manoranjan Mohanty:
PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image. 188-199 - George Vershinin

, Asaf Cohen
, Omer Gurewitz
:
Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO. 200-215 - Ron Segev, Avi Mendelson

:
The Use of Performance-Countersto Perform Side-Channel Attacks. 216-233 - Maria Paola Tatulli, Tommaso Paladini, Mario D'Onghia, Michele Carminati

, Stefano Zanero:
HAMLET: A Transformer Based Approach for Money Laundering Detection. 234-250 - Jiayi Tan

, Dipti Kapoor Sarmah:
Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks. 251-272 - Ziyu Zhao

, Jintai Ding
:
Practical Improvements on BKZ Algorithm. 273-284 - Faithful Chiagoziem Onwuegbuche

, Anca Delia Jurcut
, Liliana Pasquale
:
Enhancing Ransomware Classification with Multi-stage Feature Selection and Data Imbalance Correction. 285-295 - Jakub Breier

, Dirmanto Jap, Xiaolu Hou
, Shivam Bhasin:
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks. 296-306 - Stan Korzilius, Berry Schoenmakers:

New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic. 307-319 - Madhav Nair, Rajat Sadhukhan, Debdeep Mukhopadhyay:

How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs. 320-336 - Stefano Longari, Francesco Noseda

, Michele Carminati
, Stefano Zanero:
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks. 337-352 - Giorgos Zirdelis:

On Adaptively Secure Prefix Encryption Under LWE. 353-371 - Devharsh Trivedi

, Aymen Boudguiga, Nikos Triandopoulos:
SigML: Supervised Log Anomaly with Fully Homomorphic Encryption. 372-388 - Shlomi Dolev, Avraam Yagudaev, Moti Yung:

HBSS: (Simple) Hash-Based Stateless Signatures - Hash All the Way to the Rescue! - (Preliminary Version). 389-397 - Hatice Kübra Güner, Ceyda Mangir, Oguz Yayla:

Improving Performance in Space-Hard Algorithms. 398-410 - Silvie Levy, Ehud Gudes, Danny Hendler:

A Survey of Security Challenges in Automatic Identification System (AIS) Protocol. 411-423 - Shay Gueron

:
A New Interpretation for the GHASH Authenticator of AES-GCM. 424-438 - Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, Xiao Wang:

Fast ORAM with Server-Aided Preprocessing and Pragmatic Privacy-Efficiency Trade-Off. 439-457 - Rajnish Kumar

, Shlomi Arnon
:
Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks. 458-470 - Donghoon Chang, Moti Yung:

Midgame Attacks and Defense Against Them. 471-492 - Andrei Stoian, Jordan Fréry, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoît Chevallier-Mames:

Deep Neural Networks for Encrypted Inference with TFHE. 493-500 - Vasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:

On the Existence of Highly Organized Communities in Networks of Locally Interacting Agents. 501-510 - Lucas Miranda, Cainã Figueiredo, Daniel Sadoc Menasché, Anton Kocheturov:

Patch or Exploit? NVD Assisted Classification of Vulnerability-Related GitHub Pages. 511-522

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














