中国机械工程学会生产工程分会知识服务平台

会议文集


文集名Cyber Security, Cryptology, and Machine Learning
会议名9th International Symposium on Cyber Security, Cryptology and Machine Learning (CSCML 2025)
中译名《第九届国际网络安全、密码学与机器学习专题研讨会》
机构International Association for Cryptologic Research (IACR)
会议日期December 4-5, 2025
会议地点Be'er Sheva, Israel
出版年2026
馆藏号359399


题名作者出版年
Similarity-Based Retrieval over Homomorphic EncryptionAdi Akavia; Ramy Masalha; Reut Meiri2026
Location Problems with PrivacyEric Kulikov; Michael Segal2026
Improved Range Searching and Range Emptiness Under FHE Using Copy-and-RecurseEyal Kushnir; Hayim Shaul2026
A Generalized Wiener-Type Attack Against an RSA-Like CryptosystemGeorge Teseleanu2026
Multi-party Time-Lock Puzzles: Quorum Controlled Delays Without a Single Point of FailureKarim Eldefrawy; Sashidhar Jakkamsetti; Ben Terner; Moti Yung2026
Robust and Verifiable MPC with Applications to Linear Machine Learning InferenceTzu-Shen Wang; Jimmy Dani; Juan A. Garay; Soamar Homsi; Nitesh Saxena2026
From Adversity to Advantage: Diffusion Models for Improved Detection Under AttackRoie Kazoom; Raz Birman; Ofer Hadar2026
Bitcoin+: Cheap Support for Complex Spending Conditions in a UTXO LedgerYaron Kaner; Tal Moran2026
Random Data and Its Cryptographic ApplicationsAyse Eda Yavuzyigit; Oguz Yayla2026
Privacy-Preserving Machine Learning on Web Browsing for Public OpinionSam Buxbaum; Lucas M. Tassis; Lucas Boschelli; Giovanni Comarela; Mayank Varia; Mark Crovella; Dino P. Christenson2026
Extended Meet in the Middle Attacks Using Cryptanalytic Approximations as DMZEli Biham; Stav Perle2026
Path Optimization Using DQN in the SCION Internet ArchitectureOran Bourak; Tomer Burman; Tony John; Hadassa Daltrophe; Tammar Shrot; David Hausheer2026
G2TA: Converting Graph Data to Table Data for Employing Deanonymization AttacksShlomi Dolev; Michael Elhadad; Rie Ruash2026
Credit Card Fraud Detection Using Dynamic Attention and Multi-view Graph LearningShivam Kushwaha; Ankur Jain; Somanath Tripathy2026
Meta-autoencoders: An Approach to Discovery and Representation of Relationships Between Dynamically Evolving Classes A Work-in-Progress ReportAssaf Marron; Smadar Szekely; Irun Cohen; David Harel2026
Sure! Here's a Short and Concise Title for Your Paper: "Contamination in Generated Text Detection Benchmarks"Philipp Dingfelder; Christian Riess2026
Resiliency Trade-Offs of DNSSEC Configurations to DDoS AttacksDaniel Dubnikov; Yehuda Afek; Anat Bremler-Barr2026
Kolmogorov Complexity Based Analysis of the Zeros Distribution in Locally Maximal Satisfying Truth Assignments of Random K-SAT FormulasV. Liagkou; P. E. Nastou; P. Spirakis; Y. C. Stamatiou2026
Machine Learning-Based Malware Detection on macOSAdrian Guo Xiang Low; Leonardo Aniello2026
Insights into Learning Broadcast ProtocolsDana Fisman; Noa Izsak; Swen Jacobs2026
12