Adversarijes Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features
|
2021 |
Hariom |
Principal Component Analysis Using CKKS Homomorphic Scheme
|
2021 |
Panda, Samanvaya |
Privacy-Preserving Password Strength Meters with FHE
|
2021 |
Emmadi, Nitesh |
Fast and Error-Free Negacyclic Integer Convolution Using Extended Fourier Transform
|
2021 |
Klemsa, Jakub |
Efficient Secure Ridge Regression from Randomized Gaussian Elimination
|
2021 |
Blom, Frank |
POLYDNN Polynomial Representation of NN for Communication-Less SMPC Inference
|
2021 |
Derbeko, Philip |
Invited Talk: The Coming AI Hackers
|
2021 |
Schneier, Bruce |
Turning HATE into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
|
2021 |
Reyzin, Leonid |
Early Detection of In-Memory Malicious Activity Based on Run-Time Environmental Features
|
2021 |
Yaffe, Dorel |
Effcient Generic Arithmetic for KKW: Practical Linear MPC-in-the-Head NIZK on Commodity Hardware Without Trusted Setup
|
2021 |
Heath, David |
Using a Neural Network to Detect Anomalies Given an N-gram Profile
|
2021 |
Yu, Byunggu |
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks
|
2021 |
Chillotti, Ilaria |
DepthStAr: Deep Strange Arguments Detection
|
2021 |
Berlin, Michael |
Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies
|
2021 |
Hubáček, Iddo Bentov. Pavel |
Game of Drones - Detecting Spying Drones Using Time Domain Analysis
|
2021 |
Nassi, Ben |
Lawful Interception in WebRTC Peer-To-Peer Communication
|
2021 |
Wagner, Assaf |
Hierarchical Ring Signatures Immune to Randomness Injection Attacks
|
2021 |
Krzywiecki, Lukasz |
Warped Input Gaussian Processes for Time Series Forecasting
|
2021 |
Vinokur, Igor |
Polynomial Time k-Shortest Multi-criteria Prioritized and All-Criteria-Disjoint Paths: (Extended Abstract)
|
2021 |
Dinitz, Yefim |
DNS-Morph: UDP-Based Bootstrapping Protocol for Tor
|
2021 |
Ailabouni, Rami |