Fake News Detection in Social Networks Using Machine Learning and Trust
|
2022 |
Voloch, Nadav |
On the Undecidability of the Panopticon Detection Problem
|
2022 |
Liagkou, Vasiliki |
Blind Rotation in Fully Homomorphic Encryption with Extended Keys
|
2022 |
Joye, Marc |
Smart Cybercrime Classification for Digital Forensics with Small Datasets
|
2022 |
Tuhin, Isfaque Al Kaderi |
Auditable, Available and Resilient Private Computation on the Blockchain via MPC
|
2022 |
Cordi, Christopher |
Predicting Subscriber Usage: Analyzing Multidimensional Time-Series Using Convolutional Neural Networks
|
2022 |
Azaria, Benjamin |
Enhancing Cybersecurity of Satellites at Sub-THz Bands
|
2022 |
Kumar, Rajnish |
BFLUT Bloom Filter for Private Look Up Tables
|
2022 |
Dolev, Shlomi |
Mutual Accountability Layer: Accountable Anonymity Within Accountable Trust
|
2022 |
Daza, Vanesa |
Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Model from Enormous Crowds
|
2022 |
Pihur, Vasyl |
Privacy Preserving DCOP Solving by Mediation
|
2022 |
Kogan, Pablo |
Botnet Attack Identification Based on SDN
|
2022 |
Dimiter, Avresky |
Transfer Learning for Time Series Classification Using Synthetic Data Generation
|
2022 |
Rotem, Yarden |
Simulating a Coupon Collector
|
2022 |
Barak-Pelleg, Dina |
Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling
|
2022 |
Hayoon, Hen |
Privacy-Preserving Contrastive Explanations with Local Foil Trees
|
2022 |
Veugen, Thijs |
Counter Mode for Long Messages and a Long Nonce
|
2022 |
Gueron, Shay |
Machine-Learning Based Objective Function Selection for Community Detection
|
2022 |
Bornstein, Asa |
Reinforcement Based User Scheduling for Cellular Communications
|
2022 |
Gradus, Nimrod |
A Heuristic Framework to Search for Approximate Mutually Unbiased Bases
|
2022 |
Chaudhury, Sreejit |