The 6th International Symposium on Cyber Security Cryptology and Machine Learning (CSCML 2022) | Jun 30, 8:00 AM GMT+3 – Jul 01, 6:00 PM GMT+3 Corona Pending Online and/or Be'er Sheva

Schedule

Get Tickets


  • 10 minutes

    CSCML 2022 Opening Ceremony - Shlomi Dolev


  • 50 minutes

    Keynote Speaker 1- Michal Braverman-Blumenstyk


  • 15 minutes

    Blind Rotation in Fully Homomorphic Encryption with Extended Keys


  • 1 hour 31 minutes

    Academic Track: Morning Session


  • 15 minutes

    Monitoring Time Series with Missing Values: A Deep Bayesian Approach


  • 15 minutes

    Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling


  • 15 minutes

    Design of Intrusion Detection System based on Logical Analysis of Data (LAD) using Information Gain Ratio


  • 15 minutes

    Simulating a Coupon Collector


  • 8 minutes

    On the Undecidability of the Panopticon Detection Problem


  • 8 minutes

    Privacy-Preserving Contrastive Explanations with Local Foil Trees


  • 15 minutes

    Timing Leakage Analysis of Non-Constant-Time NTT Implementations with Harvey Butterflies


  • 1 hour 31 minutes

    Academic Track: Mid-Morning Session


  • 15 minutes

    Predicting the Direction of Changes in the Values of Time Series for Relatively Small Training Samples


  • 15 minutes

    Machine-Learning Based Objective Function Selection for Community Detection


  • 15 minutes

    Randomness for Randomness Testing


  • 15 minutes

    Botnet Attack Identification Based on SDN


  • 8 minutes

    Setting Up an Anonymous Gesture Database as well as Enhancing it with a Verbal Script Simulator for Rehabilitation Appli


  • 8 minutes

    Fake News Detection in Social Networks using Machine Learning and Trust


  • 15 minutes

    Reinforcement Based User Scheduling for Cellular Communications


  • 1 hour 31 minutes

    Academic Track: Noon Session


  • 15 minutes

    A Heuristic Framework to Search for Approximate Mutually Unbiased Bases


  • 15 minutes

    Counter Mode for Long Messages and a Long Nonce


  • 15 minutes

    Transfer Learning for Time Series Classification using Synthetic Data Generation


  • 15 minutes

    Non-Stopping Junctions via Traffic Scheduling


  • 8 minutes

    Predicting Subscriber Usage: Analyzing Multidimensional Time-Series using Convolutional Neural Networks


  • 8 minutes

    Smart Cybercrime Classification for Digital Forensics with Small Datasets


  • 50 minutes

    Keynote Speaker 2: Shlomo Dovrat


  • 15 minutes

    Auditable, Available and Resilient Private Computation on the Blockchain via MPC


  • 1 hour 24 minutes

    Academic Track: Afternoon Session


  • 15 minutes

    Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting


  • 15 minutes

    Mutual Accountability Layer: Accountable Anonymity within Accountable Trust


  • 15 minutes

    Faster Post-Quantum TLS Handshakes without Intermediate CA Certificates


  • 8 minutes

    Enhancing Cybersecurity of Satellites at sub-THz Band


  • 8 minutes

    Polynomial Approximation of Inverse sqrt Function for FHE


  • 8 minutes

    Detecting Clickbait in Online Social Media: You Won’t Believe How We Did It


  • 26 minutes

    Entrepreneur (Pitch) Finalist Ceremony


  • 50 minutes

    Keynote Speaker 3: Dr. Burt Kaliski Jr.


  • 15 minutes

    Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum


  • 1 hour 31 minutes

    Academic Track: Evening Session


  • 15 minutes

    A Linear-Time 2-Party Secure Merge Protocol


  • 15 minutes

    FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker


  • 15 minutes

    In-app Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms


  • 15 minutes

    Differentially-Private “Draw and Discard'” Machine Learning: Training Distributed Models from Enormous Crowds


  • 10 minutes

    Privacy Preserving Solution of DCOPs by Mediation


  • 8 minutes

    BFLUT Bloom Filter for Private Look Up Tables


  • 15 minutes

    Closing Ceremony/Blessing