Abstract is missing.
- Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural NetworksIlaria Chillotti, Marc Joye, Pascal Paillier. 1-19 [doi]
- Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as FeaturesHariom, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla. 20-37 [doi]
- Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient DescentThijs Veugen, Bart Kamphorst, Natasja van de L'Isle, Marie Beth van Egmond. 38-51 [doi]
- Principal Component Analysis Using CKKS Homomorphic SchemeSamanvaya Panda. 52-70 [doi]
- DepthStAr: Deep Strange Arguments DetectionMichael Berlin, Oded Margalit, Gera Weiss. 71-85 [doi]
- Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical SystemsAneet Kumar Dutta, Rohit Negi, Sandeep Kumar Shukla. 86-93 [doi]
- Privacy-Preserving Password Strength Meters with FHENitesh Emmadi, Imtiyazuddin Shaik, Harshal Tupsamudre, Harika Narumanchi, Rajan Mindigal Alasingara Bhattachar, Sachin Premsukh Lodha. 94-103 [doi]
- Automatic Detection of Water Stress in Corn Using Image Processing and Deep LearningMor Soffer, Ofer Hadar, Naftali Lazarovitch. 104-113 [doi]
- Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable CryptocurrenciesIddo Bentov, Pavel Hubácek, Tal Moran, Asaf Nadler. 114-127 [doi]
- Game of Drones - Detecting Spying Drones Using Time Domain AnalysisBen Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici. 128-144 [doi]
- Privacy Vulnerability of NeNDS Collaborative FilteringEyal Nussbaum, Michael Segal 0001. 145-152 [doi]
- Lawful Interception in WebRTC Peer-To-Peer CommunicationAssaf Wagner, Rami Puzis. 153-170 [doi]
- Hierarchical Ring Signatures Immune to Randomness Injection AttacksLukasz Krzywiecki, Miroslaw Kutylowski, Rafal Rothenberger, Bartosz Drzazga. 171-186 [doi]
- Theoretical Aspects of a Priori On-Line Assessment of Data Predictability in Applied TasksSergey Frenkel. 187-195 [doi]
- Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement - (Extended Abstract)Dor Bitan, Shlomi Dolev. 196-204 [doi]
- Warped Input Gaussian Processes for Time Series ForecastingIgor Vinokur, David Tolpin. 205-220 [doi]
- History Binding Signature - (Extended Abstract)Shlomi Dolev, Matan Liber. 221-229 [doi]
- Effective Enumeration of Infinitely Many Programs that Evade Formal Malware AnalysisVasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou. 230-243 [doi]
- DNS-Morph: UDP-Based Bootstrapping Protocol for TorRami Ailabouni, Orr Dunkelman, Sara Bitan. 244-265 [doi]
- Polynomial Time k-Shortest Multi-criteria Prioritized and All-Criteria-Disjoint Paths - (Extended Abstract)Yefim Dinitz, Shlomi Dolev, Manish Kumar 0011. 266-274 [doi]
- Binding BIKE Errors to a Key PairNir Drucker, Shay Gueron, Dusan Kostic. 275-281 [doi]
- Fast and Error-Free Negacyclic Integer Convolution Using Extended Fourier TransformJakub Klemsa. 282-300 [doi]
- Efficient Secure Ridge Regression from Randomized Gaussian EliminationFrank Blom, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede. 301-316 [doi]
- PolyDNN Polynomial Representation of NN for Communication-Less SMPC InferencePhilip Derbeko, Shlomi Dolev. 317-324 [doi]
- Use of Blockchain for Ensuring Data Integrity in Cloud DatabasesYakov Vainshtein, Ehud Gudes. 325-335 [doi]
- Invited Talk: The Coming AI HackersBruce Schneier. 336-360 [doi]
- Turning HATE into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPCLeonid Reyzin, Adam D. Smith, Sophia Yakoubov. 361-378 [doi]
- Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and MaintenanceAkif Patel, Moti Yung. 379-396 [doi]
- Early Detection of In-Memory Malicious Activity Based on Run-Time Environmental FeaturesDorel Yaffe, Danny Hendler. 397-404 [doi]
- Software Integrity and Validation Using Cryptographic Composability and Computer VisionDonald Beaver. 405-413 [doi]
- Efficient Generic Arithmetic for KKW - Practical Linear MPC-in-the-Head NIZK on Commodity Hardware Without Trusted SetupDavid Heath, Vladimir Kolesnikov, Jiahui Lu. 414-431 [doi]
- Trust and Verify: A Complexity-Based IoT Behavioral Enforcement MethodKyle Haefner, Indrakshi Ray. 432-450 [doi]
- Using a Neural Network to Detect Anomalies Given an N-gram ProfileByunggu Yu, Junwhan Kim. 451-466 [doi]
- Meta-X: A Technique for Reducing Communication in Geographically Distributed ComputationsFoto N. Afrati, Shlomi Dolev, Shantanu Sharma 0001, Jeffrey D. Ullman. 467-486 [doi]
- Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM (Extended Abstract)Shlomi Dolev, Stav Doolman. 487-496 [doi]
- Implementing GDPR in Social Networks Using Trust and ContextNadav Voloch, Ehud Gudes, Nurit Gal-Oz. 497-503 [doi]