FindBook      Google Book      Amazon      博客來     
  • Cyber security, cryptology, and machine learning = 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Cyber security, cryptology, and machine learning/ edited by Shlomi Dolev, Ehud Gudes, Pascal Paillier.
    其他題名: 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023 : proceedings /
    其他題名: CSCML 2023
    其他作者: Dolev, Shlomi.
    團體作者: CSCML (Symposium)
    出版者: Cham :Springer Nature Switzerland : : 2023.,
    面頁冊數: xiv, 524 p. :ill. (chiefly color), digital ;24 cm.
    內容註: Localhost Detour from Public to Private Networks -- Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation -- Efficient Extended GCD and Class Groups from Secure Integer Arithmetic -- On Distributed Randomness Generation in Blockchains -- Efficient Skip Connections Realization for Secure Inference on Encrypted Data -- Single Instance Self-Masking via Permutations A Fusion-Based Framework for Unsupervised Single Image Super-Resolution -- Generating One-Hot Maps under Encryption Building blocks for LSTM homomorphic evaluation with TFHE -- CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks -- Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel -- A Bag of Tokens Neural Network to Predict Webpage Age -- Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations (Short Paper) -- PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image -- Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO -- The use of Performance-Counters to perform side-channel attacks -- HAMLET: A Transformer Based Approach for Money Laundering Detection -- Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks -- Practical Improvements on BKZ Algorithm -- Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction -- Short Paper: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks -- New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic -- How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs -- Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks -- On adaptively secure prefix encryption under LWE SigML: Supervised Log Anomaly with Fully Homomorphic Encryption -- HBSS: (Simple) Hash-Based Stateless Signatures -- Hash all the way to the Rescue -- Improving Performance in Space-Hard Algorithms -- A survey of security challenges in Automatic Identification System (AIS) Protocol -- A new interpretation for the GHASH authenticator of AES-GCM -- Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off -- Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks -- Midgame Attacks and Defense Against Them -- Deep Neural Networks for Encrypted Inference with TFHE -- On the existence of highly organized communities in networks of locally interacting agents -- Patch or Exploit? NVD Assisted Classification of Vulnerability-Related Github Pages.
    Contained By: Springer Nature eBook
    標題: Data encryption (Computer science) - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-34671-2
    ISBN: 9783031346712
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入