Abstract is missing.
- Blind Rotation in Fully Homomorphic Encryption with Extended KeysMarc Joye, Pascal Paillier. 1-18 [doi]
- Monitoring Time Series with Missing Values: A Deep Probabilistic ApproachOshri Barazani, David Tolpin. 19-28 [doi]
- Time, Memory and Accuracy Tradeoffs in Side-Channel Trace ProfilingHen Hayoon, Yossi Oren. 29-46 [doi]
- Design of Intrusion Detection System Based on Logical Analysis of Data (LAD) Using Information Gain RatioSneha Chauhan, Sugata Gangopadhyay. 47-65 [doi]
- Simulating a Coupon CollectorDina Barak-Pelleg, Daniel Berend. 66-77 [doi]
- On the Undecidability of the Panopticon Detection ProblemVasiliki Liagkou, Panagiotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou. 78-87 [doi]
- Privacy-Preserving Contrastive Explanations with Local Foil TreesThijs Veugen, Bart Kamphorst, Michiel Marcus. 88-98 [doi]
- Timing Leakage Analysis of Non-constant-time NTT Implementations with Harvey ButterfliesNir Drucker, Tomer Pelleg. 99-117 [doi]
- Predicting the Direction of Changes in the Values of Time Series for Relatively Small Training SamplesSergey Frenkel. 118-134 [doi]
- Machine-Learning Based Objective Function Selection for Community DetectionAsa Bornstein, Amir Rubin, Danny Hendler. 135-152 [doi]
- Randomness for Randomness TestingDaniel Berend, Shlomi Dolev, Manish Kumar 0011. 153-161 [doi]
- Botnet Attack Identification Based on SDNDimiter Avresky, Dobrin Dobrev. 162-169 [doi]
- Setting Up an Anonymous Gesture Database as Well as Enhancing It with a Verbal Script Simulator for Rehabilitation ApplicationsYoram Segal, Ofer Hadar. 170-179 [doi]
- Fake News Detection in Social Networks Using Machine Learning and TrustNadav Voloch, Ehud Gudes, Nurit Gal-Oz, Rotem Mitrany, Ofri Shani, Maayan Shoel. 180-188 [doi]
- Reinforcement Based User Scheduling for Cellular CommunicationsNimrod Gradus, Asaf Cohen 0001, Erez Biton, Omer Gurwitz. 189-207 [doi]
- A Heuristic Framework to Search for Approximate Mutually Unbiased BasesSreejit Chaudhury, Ajeet Kumar, Subhamoy Maitra, Somjit Roy, Sourav Sen Gupta. 208-223 [doi]
- Counter Mode for Long Messages and a Long NonceShay Gueron. 224-231 [doi]
- Transfer Learning for Time Series Classification Using Synthetic Data GenerationYarden Rotem, Nathaniel Shimoni, Lior Rokach, Bracha Shapira. 232-246 [doi]
- Non-stopping Junctions via Traffic SchedulingShlomi Dolev, Ehud Gudes, Hannah Yair. 247-258 [doi]
- Predicting Subscriber Usage: Analyzing Multidimensional Time-Series Using Convolutional Neural NetworksBenjamin Azaria, Lee-Ad Gottlieb. 259-269 [doi]
- Smart Cybercrime Classification for Digital Forensics with Small DatasetsIsfaque Al Kaderi Tuhin, Peter Loh, Zhengkui Wang. 270-280 [doi]
- Auditable, Available and Resilient Private Computation on the Blockchain via MPCChristopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C. Kao, Vladimir Kolesnikov, Abrahim Ladha, Nicholas D. Pattengale. 281-299 [doi]
- Union Buster: A Cross-Container Covert-Channel Exploiting Union MountingNovak Boskov, Naor Radami, Trishita Tiwari, Ari Trachtenberg. 300-317 [doi]
- Mutual Accountability Layer: Accountable Anonymity Within Accountable TrustVanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis, Arantxa Zapico. 318-336 [doi]
- Faster Post-Quantum TLS Handshakes Without Intermediate CA CertificatesPanos Kampanakis, Michael Kallitsis. 337-355 [doi]
- Enhancing Cybersecurity of Satellites at Sub-THz BandsRajnish Kumar, Shlomi Arnon. 356-365 [doi]
- Polynomial Approximation of Inverse sqrt Function for FHESamanvaya Panda. 366-376 [doi]
- Detecting Clickbait in Online Social Media: You Won't Believe How We Did ItAviad Elyashar, Jorge Bendahan, Rami Puzis. 377-387 [doi]
- Etherless Ethereum Tokens: Simulating Native Tokens in EthereumJohn Andrews, Michele Ciampi, Vassilis Zikas. 388-407 [doi]
- A Linear-Time 2-Party Secure Merge ProtocolBrett Hemenway Falk, Rohit Nema, Rafail Ostrovsky. 408-427 [doi]
- FairMM: A Fast and Frontrunning-Resistant Crypto Market-MakerMichele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky, Vassilis Zikas. 428-446 [doi]
- In-App Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar PlatformsKarim Eldefrawy, Tancrède Lepoint, Laura Tam. 447-467 [doi]
- Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Model from Enormous CrowdsVasyl Pihur, Aleksandra Korolova, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, Ruogu Zeng. 468-486 [doi]
- Privacy Preserving DCOP Solving by MediationPablo Kogan, Tamir Tassa, Tal Grinshpoun. 487-498 [doi]
- BFLUT Bloom Filter for Private Look Up TablesShlomi Dolev, Ehud Gudes, Erez Segev, Jeffrey D. Ullman, Grisha Weintraub. 499-505 [doi]