Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems
|
2021 |
Dutta, Aneet Kumar |
Privacy Vulnerability of NeNDS Collaborative Filtering
|
2021 |
Nussbaum, Eyal |
History Binding Signature: (Extended Abstract)
|
2021 |
Dolev, Shlomi |
Software Integrity and Validation Using Cryptographic Composability and Computer Vision
|
2021 |
Beaver, Donald |
Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations
|
2021 |
Afrati, Foto |
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks
|
2021 |
Chillotti, Ilaria |
DepthStAr: Deep Strange Arguments Detection
|
2021 |
Berlin, Michael |
Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies
|
2021 |
Hubáček, Iddo Bentov. Pavel |
Game of Drones - Detecting Spying Drones Using Time Domain Analysis
|
2021 |
Nassi, Ben |
Lawful Interception in WebRTC Peer-To-Peer Communication
|
2021 |
Wagner, Assaf |
Hierarchical Ring Signatures Immune to Randomness Injection Attacks
|
2021 |
Krzywiecki, Lukasz |
Warped Input Gaussian Processes for Time Series Forecasting
|
2021 |
Vinokur, Igor |
Polynomial Time k-Shortest Multi-criteria Prioritized and All-Criteria-Disjoint Paths: (Extended Abstract)
|
2021 |
Dinitz, Yefim |
DNS-Morph: UDP-Based Bootstrapping Protocol for Tor
|
2021 |
Ailabouni, Rami |
Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance
|
2021 |
Patel, Akif |
Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method
|
2021 |
Haefner, Kyle |
Implementing GDPR in Social Networks Using Trust and Context
|
2021 |
Voloch, Nadav |
Adversarijes Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features
|
2021 |
Hariom |
Principal Component Analysis Using CKKS Homomorphic Scheme
|
2021 |
Panda, Samanvaya |
Privacy-Preserving Password Strength Meters with FHE
|
2021 |
Emmadi, Nitesh |