Linked e-resources

Details

Blind Rotation in Fully Homomorphic Encryption with Extended Keys
Monitoring Time Series With Missing Values: a Deep Probabilistic Approach
Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling
Design of Intrusion Detection System based on Logical Analysis of Data (LAD) using Information Gain Ratio
Simulating a Coupon Collector
On the undecidability of the Panopticon detection problem
Privacy-Preserving Contrastive Explanations with Local Foil Trees
Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies
Predicting the direction of changes in the values of time series for relatively small training samples
Machine-Learning Based Objective Function Selection for Community Detection
Randomness for Randomness Testing
Botnet attack identification based on SDN
Setting up an anonymous gesture database as well as enhancing it with a verbal script simulator for rehabilitation applications
Fake News Detection in Social Networks using Machine Learning and Trust
Reinforcement Based User Scheduling for Cellular Communications
A Heuristic Framework to search for Approximate Mutually Unbiased Bases
Counter Mode for Long Messages and a Long Nonce
Transfer learning for time series classification using synthetic data generation
Non-Stopping Junctions via Traffic Scheduling
Predicting subscriber usage: Analyzing multidimensional time-series using Convolutional Neural Networks
Smart Cybercrime Classification for Digital Forensics with Small Datasets
Auditable, Available and Resilient Private Computation on the Blockchain via MPC
Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting
Mutual Accountability Layer: Accountable Anonymity within Accountable Trust
Faster Post-Quantum TLS handshakes Without Intermediate CA Certificates
Enhancing Cybersecurity of Satellites at sub-THz Bands
Polynomial Approximation of Inverse sqrt Function for FHE
Detecting Clickbait in Online Social Media: You Wont Believe How We Did It
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum
A Linear-Time 2-Party Secure Merge Protocol
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker.-In-app Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms
Differentially-Private ``Draw and Discard'' Machine Learning: Training Distributed Models from Enormous Crowds
Privacy Preserving Solution of DCOPs by Mediation
BFLUT Bloom Filter for Private Look Up Tables.

Browse Subjects

Show more subjects...

Statistics

from
to
Export