E-Book, Englisch, Band 13914, 524 Seiten, eBook
Dolev / Gudes / Paillier Cyber Security, Cryptology, and Machine Learning
1. Auflage 2023
ISBN: 978-3-031-34671-2
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29–30, 2023, Proceedings
E-Book, Englisch, Band 13914, 524 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-34671-2
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Localhost Detour from Public to Private Networks.- Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation.- Efficient Extended GCD and Class Groups from Secure Integer Arithmetic.- On Distributed Randomness Generation in Blockchains.- Efficient Skip Connections Realization for Secure Inference on Encrypted Data.- Single Instance Self-Masking via PermutationsA Fusion-Based Framework for Unsupervised Single Image Super-Resolution.- Generating One-Hot Maps under EncryptionBuilding blocks for LSTM homomorphic evaluation with TFHE.- CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks.- Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel.- A Bag of Tokens Neural Network to Predict Webpage Age.- Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations (Short Paper).- PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image.- Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO.- The use of Performance-Counters to perform side-channel attacks.- HAMLET: A Transformer Based Approach for Money Laundering Detection.- Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks.- Practical Improvements on BKZ Algorithm.- Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction.- Short Paper: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks.- New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic.- How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs.- Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks.- On adaptively secure prefix encryption under LWESigML: Supervised Log Anomaly with Fully Homomorphic Encryption.- HBSS: (Simple) Hash-Based Stateless Signatures -- Hash all the way to the Rescue.- Improving Performance in Space-Hard Algorithms.- A survey of security challenges in Automatic Identification System (AIS) Protocol.- A new interpretation for the GHASH authenticator of AES-GCM.- Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off.- Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks.- Midgame Attacks and Defense Against Them.- Deep Neural Networks for Encrypted Inference with TFHE.- On the existence of highly organized communities in networks of locally interacting agents.- Patch or Exploit? NVD Assisted Classification of Vulnerability-Related Github Pages.