Fake News Detection in Social Networks Using Machine Learning and Trust
|
2022 |
Voloch, Nadav |
On the Undecidability of the Panopticon Detection Problem
|
2022 |
Liagkou, Vasiliki |
Blind Rotation in Fully Homomorphic Encryption with Extended Keys
|
2022 |
Joye, Marc |
Smart Cybercrime Classification for Digital Forensics with Small Datasets
|
2022 |
Tuhin, Isfaque Al Kaderi |
Auditable, Available and Resilient Private Computation on the Blockchain via MPC
|
2022 |
Cordi, Christopher |
Predicting Subscriber Usage: Analyzing Multidimensional Time-Series Using Convolutional Neural Networks
|
2022 |
Azaria, Benjamin |
Enhancing Cybersecurity of Satellites at Sub-THz Bands
|
2022 |
Kumar, Rajnish |
BFLUT Bloom Filter for Private Look Up Tables
|
2022 |
Dolev, Shlomi |
Mutual Accountability Layer: Accountable Anonymity Within Accountable Trust
|
2022 |
Daza, Vanesa |
Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Model from Enormous Crowds
|
2022 |
Pihur, Vasyl |
Privacy Preserving DCOP Solving by Mediation
|
2022 |
Kogan, Pablo |
Monitoring Time Series with Missing Values: A Deep Probabilistic Approach
|
2022 |
Barazani, Oshri |
Randomness for Randomness Testing
|
2022 |
Berend, Daniel |
Predicting the Direction of Changes in the Values of Time Series for Relatively Small Training Samples
|
2022 |
Frenkel, Sergey |
Design of Intrusion Detection System Based on Logical Analysis of Data (LAD) Using Information Gain Ratio
|
2022 |
Chauhan, Sneha |
Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting
|
2022 |
Boskov, Novak |
Botnet Attack Identification Based on SDN
|
2022 |
Dimiter, Avresky |
Transfer Learning for Time Series Classification Using Synthetic Data Generation
|
2022 |
Rotem, Yarden |
Simulating a Coupon Collector
|
2022 |
Barak-Pelleg, Dina |
Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling
|
2022 |
Hayoon, Hen |