Botnet Attack Identification Based on SDN
|
2022 |
Dimiter, Avresky |
Transfer Learning for Time Series Classification Using Synthetic Data Generation
|
2022 |
Rotem, Yarden |
Simulating a Coupon Collector
|
2022 |
Barak-Pelleg, Dina |
Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling
|
2022 |
Hayoon, Hen |
Privacy-Preserving Contrastive Explanations with Local Foil Trees
|
2022 |
Veugen, Thijs |
Counter Mode for Long Messages and a Long Nonce
|
2022 |
Gueron, Shay |
Machine-Learning Based Objective Function Selection for Community Detection
|
2022 |
Bornstein, Asa |
Reinforcement Based User Scheduling for Cellular Communications
|
2022 |
Gradus, Nimrod |
A Heuristic Framework to Search for Approximate Mutually Unbiased Bases
|
2022 |
Chaudhury, Sreejit |
Timing Leakage Analysis of Non-constant-time NTT Implementations with Harvey Butterflies
|
2022 |
Drucker, Nir |
Non-stopping Junctions via Traffic Scheduling
|
2022 |
Dolev, Shlomi |
Faster Post-Quantum TLS Handshakes Without Intermediate CA Certificates
|
2022 |
Kampanakis, Panos |
Detecting Clickbait in Online Social Media: You Won’t Believe How We Did It
|
2022 |
Elyashar, Aviad |
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum
|
2022 |
Andrews, John |
Fake News Detection in Social Networks Using Machine Learning and Trust
|
2022 |
Voloch, Nadav |
On the Undecidability of the Panopticon Detection Problem
|
2022 |
Liagkou, Vasiliki |
Blind Rotation in Fully Homomorphic Encryption with Extended Keys
|
2022 |
Joye, Marc |
Smart Cybercrime Classification for Digital Forensics with Small Datasets
|
2022 |
Tuhin, Isfaque Al Kaderi |
Auditable, Available and Resilient Private Computation on the Blockchain via MPC
|
2022 |
Cordi, Christopher |
Predicting Subscriber Usage: Analyzing Multidimensional Time-Series Using Convolutional Neural Networks
|
2022 |
Azaria, Benjamin |