The 6th International Symposium on Cyber Security Cryptology and Machine Learning (CSCML 2022) | Jun 30, 8:00 AM GMT+3 – Jul 01, 6:00 PM GMT+3 Corona Pending Online and/or Be'er Sheva
Schedule
Get Tickets- 10 minutes
CSCML 2022 Opening Ceremony - Shlomi Dolev
- 50 minutes
Keynote Speaker 1- Michal Braverman-Blumenstyk
- 15 minutes
Blind Rotation in Fully Homomorphic Encryption with Extended Keys
- 1 hour 31 minutes
Academic Track: Morning Session
- 15 minutes
Monitoring Time Series with Missing Values: A Deep Bayesian Approach
- 15 minutes
Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling
- 15 minutes
Design of Intrusion Detection System based on Logical Analysis of Data (LAD) using Information Gain Ratio
- 15 minutes
Simulating a Coupon Collector
- 8 minutes
On the Undecidability of the Panopticon Detection Problem
- 8 minutes
Privacy-Preserving Contrastive Explanations with Local Foil Trees
- 15 minutes
Timing Leakage Analysis of Non-Constant-Time NTT Implementations with Harvey Butterflies
- 1 hour 31 minutes
Academic Track: Mid-Morning Session
- 15 minutes
Predicting the Direction of Changes in the Values of Time Series for Relatively Small Training Samples
- 15 minutes
Machine-Learning Based Objective Function Selection for Community Detection
- 15 minutes
Randomness for Randomness Testing
- 15 minutes
Botnet Attack Identification Based on SDN
- 8 minutes
Setting Up an Anonymous Gesture Database as well as Enhancing it with a Verbal Script Simulator for Rehabilitation Appli
- 8 minutes
Fake News Detection in Social Networks using Machine Learning and Trust
- 15 minutes
Reinforcement Based User Scheduling for Cellular Communications
- 1 hour 31 minutes
Academic Track: Noon Session
- 15 minutes
A Heuristic Framework to Search for Approximate Mutually Unbiased Bases
- 15 minutes
Counter Mode for Long Messages and a Long Nonce
- 15 minutes
Transfer Learning for Time Series Classification using Synthetic Data Generation
- 15 minutes
Non-Stopping Junctions via Traffic Scheduling
- 8 minutes
Predicting Subscriber Usage: Analyzing Multidimensional Time-Series using Convolutional Neural Networks
- 8 minutes
Smart Cybercrime Classification for Digital Forensics with Small Datasets
- 50 minutes
Keynote Speaker 2: Shlomo Dovrat
- 15 minutes
Auditable, Available and Resilient Private Computation on the Blockchain via MPC
- 1 hour 24 minutes
Academic Track: Afternoon Session
- 15 minutes
Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting
- 15 minutes
Mutual Accountability Layer: Accountable Anonymity within Accountable Trust
- 15 minutes
Faster Post-Quantum TLS Handshakes without Intermediate CA Certificates
- 8 minutes
Enhancing Cybersecurity of Satellites at sub-THz Band
- 8 minutes
Polynomial Approximation of Inverse sqrt Function for FHE
- 8 minutes
Detecting Clickbait in Online Social Media: You Won’t Believe How We Did It
- 26 minutes
Entrepreneur (Pitch) Finalist Ceremony
- 50 minutes
Keynote Speaker 3: Dr. Burt Kaliski Jr.
- 15 minutes
Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum
- 1 hour 31 minutes
Academic Track: Evening Session
- 15 minutes
A Linear-Time 2-Party Secure Merge Protocol
- 15 minutes
FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker
- 15 minutes
In-app Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms
- 15 minutes
Differentially-Private “Draw and Discard'” Machine Learning: Training Distributed Models from Enormous Crowds
- 10 minutes
Privacy Preserving Solution of DCOPs by Mediation
- 8 minutes
BFLUT Bloom Filter for Private Look Up Tables
- 15 minutes
Closing Ceremony/Blessing