先进制造业知识服务平台
国家科技图书文献中心机械分馆  工信部产业技术基础公共服务平台  国家中小企业公共服务示范平台

会议文集


文集名Cyber Security, Cryptology, and Machine Learning
会议名9th International Symposium on Cyber Security, Cryptology and Machine Learning (CSCML 2025)
中译名《第九届国际网络安全、密码学与机器学习专题研讨会》
机构International Association for Cryptologic Research (IACR)
会议日期December 4-5, 2025
会议地点Be'er Sheva, Israel
出版年2026
馆藏号359399


题名作者出版年
Similarity-Based Retrieval over Homomorphic EncryptionAdi Akavia; Ramy Masalha; Reut Meiri2026
Location Problems with PrivacyEric Kulikov; Michael Segal2026
Improved Range Searching and Range Emptiness Under FHE Using Copy-and-RecurseEyal Kushnir; Hayim Shaul2026
A Generalized Wiener-Type Attack Against an RSA-Like CryptosystemGeorge Teseleanu2026
Multi-party Time-Lock Puzzles: Quorum Controlled Delays Without a Single Point of FailureKarim Eldefrawy; Sashidhar Jakkamsetti; Ben Terner; Moti Yung2026
Robust and Verifiable MPC with Applications to Linear Machine Learning InferenceTzu-Shen Wang; Jimmy Dani; Juan A. Garay; Soamar Homsi; Nitesh Saxena2026
From Adversity to Advantage: Diffusion Models for Improved Detection Under AttackRoie Kazoom; Raz Birman; Ofer Hadar2026
Bitcoin+: Cheap Support for Complex Spending Conditions in a UTXO LedgerYaron Kaner; Tal Moran2026
Random Data and Its Cryptographic ApplicationsAyse Eda Yavuzyigit; Oguz Yayla2026
Privacy-Preserving Machine Learning on Web Browsing for Public OpinionSam Buxbaum; Lucas M. Tassis; Lucas Boschelli; Giovanni Comarela; Mayank Varia; Mark Crovella; Dino P. Christenson2026
Extended Meet in the Middle Attacks Using Cryptanalytic Approximations as DMZEli Biham; Stav Perle2026
Path Optimization Using DQN in the SCION Internet ArchitectureOran Bourak; Tomer Burman; Tony John; Hadassa Daltrophe; Tammar Shrot; David Hausheer2026
G2TA: Converting Graph Data to Table Data for Employing Deanonymization AttacksShlomi Dolev; Michael Elhadad; Rie Ruash2026
Credit Card Fraud Detection Using Dynamic Attention and Multi-view Graph LearningShivam Kushwaha; Ankur Jain; Somanath Tripathy2026
Meta-autoencoders: An Approach to Discovery and Representation of Relationships Between Dynamically Evolving Classes A Work-in-Progress ReportAssaf Marron; Smadar Szekely; Irun Cohen; David Harel2026
Sure! Here's a Short and Concise Title for Your Paper: "Contamination in Generated Text Detection Benchmarks"Philipp Dingfelder; Christian Riess2026
Resiliency Trade-Offs of DNSSEC Configurations to DDoS AttacksDaniel Dubnikov; Yehuda Afek; Anat Bremler-Barr2026
Kolmogorov Complexity Based Analysis of the Zeros Distribution in Locally Maximal Satisfying Truth Assignments of Random K-SAT FormulasV. Liagkou; P. E. Nastou; P. Spirakis; Y. C. Stamatiou2026
Machine Learning-Based Malware Detection on macOSAdrian Guo Xiang Low; Leonardo Aniello2026
Insights into Learning Broadcast ProtocolsDana Fisman; Noa Izsak; Swen Jacobs2026
12