A Fusion-Based Framework for Unsupervised Single Image Super-Resolution
|
2023 |
Mishra, Divya |
Generating One-Hot Maps Under Encryption
|
2023 |
Aharoni, Ehud |
A Bag of Tokens Neural Network to Predict Webpage Age
|
2023 |
Meinke, Klaas |
HAMLET: A Transformer Based Approach for Money Laundering Detection
|
2023 |
Tatulli, Maria Paola |
Enhancing Ransomware Classification with Multi-stage Feature Selection and Data Imbalance Correction
|
2023 |
Onwuegbuche, Faithful Chiagoziem |
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
|
2023 |
Breier, Jakub |
SigML: Supervised Log Anomaly with Fully Homomorphic Encryption
|
2023 |
Trivedi, Devharsh |
Fast ORAM with Server-Aided Preprocessing and Pragmatic Privacy-Efficiency Trade-Off
|
2023 |
Kolesnikov, Vladimir |
On the Existence of Highly Organized Communities in Networks of Locally Interacting Agents
|
2023 |
Liagkou, Vasiliki |
Pseudo-random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation
|
2023 |
Mukhopadhyay, Madhurima |
Localhost Detour from Public to Private Networks
|
2023 |
Afek, Yehuda |
On Distributed Randomness Generation in Blockchains
|
2023 |
Komargodski, Ilan |
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks
|
2023 |
Longari, Stefano |
The Use of Performance-Countersto Perform Side-Channel Attacks
|
2023 |
Segev, Ron |
Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks
|
2023 |
Tan, Jiayi |
Practical Improvements on BKZ Algorithm
|
2023 |
Zhao, Ziyu |
How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs
|
2023 |
Nair, Madhav |
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks
|
2023 |
Longari, Stefano |
A New Interpretation for the GHASH Authenticator of AES-GCM
|
2023 |
Gueron, Shay |
Deep Neural Networks for Encrypted Inference with TFHE
|
2023 |
Stoian, Andrei |