紀錄類型: |
書目-電子資源
: Monograph/item
|
正題名/作者: |
Cyber security, cryptology, and machine learning/ edited by Shlomi Dolev, Jonathan Katz, Amnon Meisels. |
其他題名: |
6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30-July 1, 2022 : proceedings / |
其他題名: |
CSCML 2022 |
其他作者: |
Dolev, Shlomi. |
團體作者: |
CSCML (Symposium) |
出版者: |
Cham :Springer International Publishing : : 2022., |
面頁冊數: |
xiv, 508 p. :ill. (chiefly color), digital ;24 cm. |
內容註: |
Blind Rotation in Fully Homomorphic Encryption with Extended Keys -- Monitoring Time Series With Missing Values: a Deep Probabilistic Approach -- Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling -- Design of Intrusion Detection System based on Logical Analysis of Data (LAD) using Information Gain Ratio -- Simulating a Coupon Collector -- On the undecidability of the Panopticon detection problem -- Privacy-Preserving Contrastive Explanations with Local Foil Trees -- Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies -- Predicting the direction of changes in the values of time series for relatively small training samples -- Machine-Learning Based Objective Function Selection for Community Detection -- Randomness for Randomness Testing -- Botnet attack identification based on SDN -- Setting up an anonymous gesture database as well as enhancing it with a verbal script simulator for rehabilitation applications -- Fake News Detection in Social Networks using Machine Learning and Trust -- Reinforcement Based User Scheduling for Cellular Communications -- A Heuristic Framework to search for Approximate Mutually Unbiased Bases -- Counter Mode for Long Messages and a Long Nonce -- Transfer learning for time series classification using synthetic data generation -- Non-Stopping Junctions via Traffic Scheduling -- Predicting subscriber usage: Analyzing multidimensional time-series using Convolutional Neural Networks -- Smart Cybercrime Classification for Digital Forensics with Small Datasets -- Auditable, Available and Resilient Private Computation on the Blockchain via MPC -- Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting -- Mutual Accountability Layer: Accountable Anonymity within Accountable Trust -- Faster Post-Quantum TLS handshakes Without Intermediate CA Certificates -- Enhancing Cybersecurity of Satellites at sub-THz Bands -- Polynomial Approximation of Inverse sqrt Function for FHE -- Detecting Clickbait in Online Social Media: You Won't Believe How We Did It -- Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum -- A Linear-Time 2-Party Secure Merge Protocol -- FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker.-In-app Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms -- Differentially-Private ''Draw and Discard'' Machine Learning: Training Distributed Models from Enormous Crowds -- Privacy Preserving Solution of DCOPs by Mediation -- BFLUT Bloom Filter for Private Look Up Tables. |
Contained By: |
Springer Nature eBook |
標題: |
Data encryption (Computer science) - Congresses. - |
電子資源: |
https://doi.org/10.1007/978-3-031-07689-3 |
ISBN: |
9783031076893 |