International Conference on Cyber Security Cryptography and Machine Learning最新文献

筛选
英文 中文
GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation GenFace:使用逼真的合成人脸生成提高网络安全
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_2
Margarita Osadchy, Yan Wang, O. Dunkelman, S. Gibson, J. Castro, C. Solomon
{"title":"GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation","authors":"Margarita Osadchy, Yan Wang, O. Dunkelman, S. Gibson, J. Castro, C. Solomon","doi":"10.1007/978-3-319-60080-2_2","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_2","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127618480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage 简短公告:匿名凭证安全的短暂泄漏
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_7
L. Krzywiecki, Marta Wszola, Mirosław Kutyłowski
{"title":"Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage","authors":"L. Krzywiecki, Marta Wszola, Mirosław Kutyłowski","doi":"10.1007/978-3-319-60080-2_7","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_7","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133333683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System 银行欺诈检测系统的监督自调整方法
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_17
Michele Carminati, Luca Valentini, S. Zanero
{"title":"A Supervised Auto-Tuning Approach for a Banking Fraud Detection System","authors":"Michele Carminati, Luca Valentini, S. Zanero","doi":"10.1007/978-3-319-60080-2_17","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_17","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125134942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Physical Layer Security over Wiretap Channels with Random Parameters 具有随机参数的窃听通道的物理层安全性
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_11
Ziv Goldfeld, P. Cuff, H. Permuter
{"title":"Physical Layer Security over Wiretap Channels with Random Parameters","authors":"Ziv Goldfeld, P. Cuff, H. Permuter","doi":"10.1007/978-3-319-60080-2_11","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_11","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123952419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Pairing Inversion of the Self-bilinear Map on Unknown Order Groups 未知阶群上自双线性映射的配对反演
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_6
Hyang-Sook Lee, Seongan Lim, Ikkwon Yie
{"title":"On Pairing Inversion of the Self-bilinear Map on Unknown Order Groups","authors":"Hyang-Sook Lee, Seongan Lim, Ikkwon Yie","doi":"10.1007/978-3-319-60080-2_6","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_6","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122564396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scalable Attack Path Finding for Increased Security 可扩展的攻击路径查找,以提高安全性
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_18
Tom Gonda, Rami Puzis, Bracha Shapira
{"title":"Scalable Attack Path Finding for Increased Security","authors":"Tom Gonda, Rami Puzis, Bracha Shapira","doi":"10.1007/978-3-319-60080-2_18","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_18","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125689254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient, Reusable Fuzzy Extractors from LWE 高效、可重用的LWE模糊提取器
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_1
Daniel Apon, Chongwon Cho, Karim M. El Defrawy, Jonathan Katz
{"title":"Efficient, Reusable Fuzzy Extractors from LWE","authors":"Daniel Apon, Chongwon Cho, Karim M. El Defrawy, Jonathan Katz","doi":"10.1007/978-3-319-60080-2_1","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_1","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123613946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Assisting Malware Analysis with Symbolic Execution: A Case Study 用符号执行协助恶意软件分析:一个案例研究
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_12
R. Baldoni, Emilio Coppa, Daniele Cono D'Elia, C. Demetrescu
{"title":"Assisting Malware Analysis with Symbolic Execution: A Case Study","authors":"R. Baldoni, Emilio Coppa, Daniele Cono D'Elia, C. Demetrescu","doi":"10.1007/978-3-319-60080-2_12","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_12","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"61 29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130271914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
On the Optimality of the Exponential Mechanism 论指数机制的最优性
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_5
Francesco Aldà, H. Simon
{"title":"On the Optimality of the Exponential Mechanism","authors":"Francesco Aldà, H. Simon","doi":"10.1007/978-3-319-60080-2_5","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_5","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127363392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party 简要公告:使用可信和分区的第三方进行分布式数据的隐私保护挖掘
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_14
N. Maoz, E. Gudes
{"title":"Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party","authors":"N. Maoz, E. Gudes","doi":"10.1007/978-3-319-60080-2_14","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_14","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134451905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信