Security University

Results: 12075



#Item
11

1 SecureML: A System for Scalable Privacy-Preserving Machine Learning Payman Mohassel∗ and Yupeng Zhang† Research, † University of Maryland

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:37
    12Cryptography / Elliptic curve cryptography / EdDSA / Elliptic-curve cryptography / Elliptic Curve Digital Signature Algorithm / Curve25519 / Elliptic-curve DiffieHellman / Digital signature / Digital Signature Algorithm / Daniel J. Bernstein / Hash function / Public-key cryptography

    High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2011-07-09 00:19:47
    13Denial-of-service attacks / Statistical inference / Cyberwarfare / Estimation theory / Computing / Denial-of-service attack / Internet Relay Chat / Domain name system / Anycast / Cross-validation / Regression analysis / Prediction

    Poster: A DDoS Peak Traffic Volume Prediction Method Based on Machine Learning Shuang Wei† , Yijing Ding† , Tongxin Li† , Shuaifu Dai‡ , Xinfeng Wu† and Xinhui Han†∗ † Peking University ‡ CNCERT/CC

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-27 07:43:28
    14Cryptography / Advanced Encryption Standard / Data Encryption Standard / AES implementations / ARM architecture / Block ciphers / DEAL / AES instruction set / CRYPTON

    All the AES You Need on Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands ,

    Add to Reading List

    Source URL: ko.stoffelen.nl

    Language: English - Date: 2018-02-09 07:40:08
    15Algebra / Mathematics / Linear algebra / Matrices / Matrix theory / Abstract algebra / Coding theory / Trace / Circulant matrix / Square matrix / Matrix / Row and column spaces

    Column Parity Mixers Ko Stoffelen1∗ and Joan Daemen1,2 1 Digital Security Group, Radboud University, Nijmegen, The Netherlands 2

    Add to Reading List

    Source URL: ko.stoffelen.nl

    Language: English - Date: 2018-03-09 10:10:48
    16Computer security / Security engineering / Cyberwarfare / Prevention / Cybercrime / National security / Computer network security / Cyberattack / Capture the flag / Information security / Denial-of-service attack

    Poster: Shell We Play A Game? CTF-as-a-service for Security Education Adam Doup´e and Giovanni Vigna Arizona State University and UC Santa Barbara ,

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 00:24:26
    17Computational neuroscience / Chemistry / Applied mathematics / Artificial neural networks / Phase transitions / Statistics / Scientific modeling / Design of experiments / Deep learning / Distillation / Outlier / Surrogate model

    A full version of this paper is available at https://papernot.fr/files/extending-distillation.pdf Poster: Extending Defensive Distillation Nicolas Papernot and Patrick McDaniel Pennsylvania State University {ngp5056,mcd

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 02:41:14
    18Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

    Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 08:13:56
    19Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

    Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-24 15:44:20
    20Artificial neural networks / Applied mathematics / Cybernetics / Mathematics / Deep learning / CIFAR-10 / MNIST database / Rectifier / Softmax function / Feedforward neural network / Gradient descent / Activation function

    Towards Evaluating the Robustness of Neural Networks Nicholas Carlini David Wagner University of California, Berkeley A BSTRACT

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:02:30
    UPDATE