Monitoring Time Series with Missing Values: A Deep Probabilistic Approach
|
2022 |
Barazani, Oshri |
Randomness for Randomness Testing
|
2022 |
Berend, Daniel |
Predicting the Direction of Changes in the Values of Time Series for Relatively Small Training Samples
|
2022 |
Frenkel, Sergey |
Design of Intrusion Detection System Based on Logical Analysis of Data (LAD) Using Information Gain Ratio
|
2022 |
Chauhan, Sneha |
Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting
|
2022 |
Boskov, Novak |
Botnet Attack Identification Based on SDN
|
2022 |
Dimiter, Avresky |
Transfer Learning for Time Series Classification Using Synthetic Data Generation
|
2022 |
Rotem, Yarden |
Simulating a Coupon Collector
|
2022 |
Barak-Pelleg, Dina |
Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling
|
2022 |
Hayoon, Hen |
Privacy-Preserving Contrastive Explanations with Local Foil Trees
|
2022 |
Veugen, Thijs |
Counter Mode for Long Messages and a Long Nonce
|
2022 |
Gueron, Shay |
Machine-Learning Based Objective Function Selection for Community Detection
|
2022 |
Bornstein, Asa |
Reinforcement Based User Scheduling for Cellular Communications
|
2022 |
Gradus, Nimrod |
A Heuristic Framework to Search for Approximate Mutually Unbiased Bases
|
2022 |
Chaudhury, Sreejit |
Timing Leakage Analysis of Non-constant-time NTT Implementations with Harvey Butterflies
|
2022 |
Drucker, Nir |
Non-stopping Junctions via Traffic Scheduling
|
2022 |
Dolev, Shlomi |
Faster Post-Quantum TLS Handshakes Without Intermediate CA Certificates
|
2022 |
Kampanakis, Panos |
Detecting Clickbait in Online Social Media: You Won’t Believe How We Did It
|
2022 |
Elyashar, Aviad |
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum
|
2022 |
Andrews, John |
Fake News Detection in Social Networks Using Machine Learning and Trust
|
2022 |
Voloch, Nadav |