Monitoring Time Series with Missing Values: A Deep Probabilistic Approach
|
2022 |
Barazani, Oshri |
Randomness for Randomness Testing
|
2022 |
Berend, Daniel |
Predicting the Direction of Changes in the Values of Time Series for Relatively Small Training Samples
|
2022 |
Frenkel, Sergey |
Design of Intrusion Detection System Based on Logical Analysis of Data (LAD) Using Information Gain Ratio
|
2022 |
Chauhan, Sneha |
Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting
|
2022 |
Boskov, Novak |
Fake News Detection in Social Networks Using Machine Learning and Trust
|
2022 |
Voloch, Nadav |
On the Undecidability of the Panopticon Detection Problem
|
2022 |
Liagkou, Vasiliki |
Blind Rotation in Fully Homomorphic Encryption with Extended Keys
|
2022 |
Joye, Marc |
Smart Cybercrime Classification for Digital Forensics with Small Datasets
|
2022 |
Tuhin, Isfaque Al Kaderi |
Auditable, Available and Resilient Private Computation on the Blockchain via MPC
|
2022 |
Cordi, Christopher |
Predicting Subscriber Usage: Analyzing Multidimensional Time-Series Using Convolutional Neural Networks
|
2022 |
Azaria, Benjamin |
Enhancing Cybersecurity of Satellites at Sub-THz Bands
|
2022 |
Kumar, Rajnish |
BFLUT Bloom Filter for Private Look Up Tables
|
2022 |
Dolev, Shlomi |
Mutual Accountability Layer: Accountable Anonymity Within Accountable Trust
|
2022 |
Daza, Vanesa |
Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Model from Enormous Crowds
|
2022 |
Pihur, Vasyl |
Privacy Preserving DCOP Solving by Mediation
|
2022 |
Kogan, Pablo |
Setting Up an Anonymous Gesture Database as Well as Enhancing It with a Verbal Script Simulator for Rehabilitation Applications
|
2022 |
Segal, Yoram |
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker
|
2022 |
Ciampi, Michele |
A Linear-Time 2-Party Secure Merge Protocol
|
2022 |
Falk, Brett Hemenway |
Polynomial Approximation of Inverse sqrt Function for FHE
|
2022 |
Panda, Samanvaya |