International Conference on Cyber Security Cryptography and Machine Learning最新文献

筛选
英文 中文
CryptoRNN - Privacy-Preserving Recurrent Neural Networks Using Homomorphic Encryption 使用同态加密保护隐私的递归神经网络
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_16
Mayank Bakshi, Mark Last
{"title":"CryptoRNN - Privacy-Preserving Recurrent Neural Networks Using Homomorphic Encryption","authors":"Mayank Bakshi, Mark Last","doi":"10.1007/978-3-030-49785-9_16","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_16","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131961630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Comparison of DNS Based Methods for Detecting Malicious Domains 基于DNS的恶意域检测方法比较
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_14
Eyal Paz, E. Gudes
{"title":"Comparison of DNS Based Methods for Detecting Malicious Domains","authors":"Eyal Paz, E. Gudes","doi":"10.1007/978-3-030-49785-9_14","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_14","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127093799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Malicious Domain Detection 稳健的恶意域检测
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_4
Nitay Hason, A. Dvir, Chen Hajaj
{"title":"Robust Malicious Domain Detection","authors":"Nitay Hason, A. Dvir, Chen Hajaj","doi":"10.1007/978-3-030-49785-9_4","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_4","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128856881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Toward Self-stabilizing Blockchain, Reconstructing Totally Erased Blockchain (Preliminary Version) 走向自稳定区块链,重构全擦除区块链(初版)
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_12
S. Dolev, Matan Liber
{"title":"Toward Self-stabilizing Blockchain, Reconstructing Totally Erased Blockchain (Preliminary Version)","authors":"S. Dolev, Matan Liber","doi":"10.1007/978-3-030-49785-9_12","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_12","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives Based on FHE 基于FHE的高效实现隐私保护机器学习原语的推荐系统
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2020-07-02 DOI: 10.1007/978-3-030-49785-9_13
Imtiyazuddin Shaik, A. Singh, Harika Narumanchi, Nitesh Emmadi, Rajan Mindigal Alasingara Bhattachar
{"title":"A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives Based on FHE","authors":"Imtiyazuddin Shaik, A. Singh, Harika Narumanchi, Nitesh Emmadi, Rajan Mindigal Alasingara Bhattachar","doi":"10.1007/978-3-030-49785-9_13","DOIUrl":"https://doi.org/10.1007/978-3-030-49785-9_13","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130485715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Warped Input Gaussian Processes for Time Series Forecasting 时间序列预测的扭曲输入高斯过程
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-12-05 DOI: 10.1007/978-3-030-78086-9_16
David Tolpin
{"title":"Warped Input Gaussian Processes for Time Series Forecasting","authors":"David Tolpin","doi":"10.1007/978-3-030-78086-9_16","DOIUrl":"https://doi.org/10.1007/978-3-030-78086-9_16","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123558315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution 用符号执行重建用于远程访问木马的C2服务器
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_12
Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, C. Demetrescu
{"title":"Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution","authors":"Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, C. Demetrescu","doi":"10.1007/978-3-030-20951-3_12","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_12","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115124630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility 基于角色和用户可信度的在线社交网络数据安全访问控制模型
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_14
Nadav Voloch, Priel Levy, Mor Elmakies, E. Gudes
{"title":"An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility","authors":"Nadav Voloch, Priel Levy, Mor Elmakies, E. Gudes","doi":"10.1007/978-3-030-20951-3_14","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_14","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116435880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Controllable Privacy Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities 可控隐私保护区块链- FiatChain:具有执法能力的分布式隐私保护加密货币
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_16
Rami Puzis, Guy Barshap, Polina Zilberman, Oded Leiba
{"title":"Controllable Privacy Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities","authors":"Rami Puzis, Guy Barshap, Polina Zilberman, Oded Leiba","doi":"10.1007/978-3-030-20951-3_16","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_16","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130621731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond Replications in Blockchain - On/Off-Blockchain IDA for Storage Efficiency and Confidentiality (Brief Announcement) 区块链中的超越复制-关于存储效率和机密性的On/ off区块链IDA(简短公告)
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_9
S. Dolev, Yuval Poleg
{"title":"Beyond Replications in Blockchain - On/Off-Blockchain IDA for Storage Efficiency and Confidentiality (Brief Announcement)","authors":"S. Dolev, Yuval Poleg","doi":"10.1007/978-3-030-20951-3_9","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_9","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"42 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123267065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信