×

Found 358 Documents (Results 1–100)

Efficient lattice-based inner-product functional encryption. (English) Zbl 07724836

Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13178, 163-193 (2022).
MSC:  94A60 68P25 68N20
PDF BibTeX XML Cite
Full Text: DOI

Practical post-quantum password-authenticated key exchange based-on module-lattice. (English) Zbl 07628047

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 137-156 (2022).
MSC:  68M25 68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices. (English) Zbl 1499.68052

Galbraith, Steven D. (ed.), Topics in cryptology – CT-RSA 2022. Cryptographers’ track at the RSA conference 2022, virtual event, March 1–2, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13161, 297-321 (2022).
PDF BibTeX XML Cite
Full Text: DOI

Lattice-based HRA-secure attribute-based proxy re-encryption in standard model. (English) Zbl 1498.68059

Bertino, Elisa (ed.) et al., Computer security – ESORICS 2021. 26th European symposium on research in computer security, Darmstadt, Germany, October 4–8, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12973, 169-191 (2021).
MSC:  68M25 68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Evading machine learning based network intrusion detection systems with GANs. (English) Zbl 07526411

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 335-356 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

Minimax detection (MAD) for computer security: a dynamic program characterization. (English) Zbl 07526401

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 113-136 (2021).
MSC:  68M25 68T05 91A80
PDF BibTeX XML Cite
Full Text: DOI

CECMLP: new cipher-based evaluating collaborative multi-layer perceptron scheme in federated learning. (English) Zbl 1489.68046

Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12726, 79-99 (2021).
PDF BibTeX XML Cite
Full Text: DOI

Mathematics of data science. A computational approach to clustering and classification. (English) Zbl 1471.68001

Data Science Book Series. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM) (ISBN 978-1-61197-636-6/pbk). x, 189 p. (2021).
PDF BibTeX XML Cite

Towards classical hardness of module-LWE: the linear rank case. (English) Zbl 07666666

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12492, 289-317 (2020).
MSC:  68P25 68Txx 94A60
PDF BibTeX XML Cite
Full Text: DOI

Puncturable encryption: a generic construction from delegatable fully key-homomorphic encryption. (English) Zbl 07636332

Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12309, 107-127 (2020).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI arXiv

A lattice-based certificateless public key encryption with equality test in standard model. (English) Zbl 1500.94024

Liu, Zhe (ed.) et al., Information security and cryptology. 15th international conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12020, 50-65 (2020).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes. (English) Zbl 1486.94140

Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12111, 37-65 (2020).
PDF BibTeX XML Cite
Full Text: DOI

Leveled hierarchical identity-based fully homomorphic encryption from learning with rounding. (English) Zbl 1515.68119

Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 101-115 (2018).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Compactness hypothesis, potential functions, and rectifying linear space in machine learning. (English) Zbl 07703783

Rozonoer, Lev (ed.) et al., Braverman readings in machine learning. Key ideas from inception to current state. International conference commemorating the 40th anniversary of Emmanuil Braverman’s decease, Boston, MA, USA, April 28–30, 2017. Invited talks. Cham: Springer. Lect. Notes Comput. Sci. 11100, 52-102 (2018).
MSC:  68T05 68-03 68T10
PDF BibTeX XML Cite
Full Text: DOI

Reasoning web. Learning, uncertainty, streaming, and scalability. 14th international summer school 2018, Esch-sur-Alzette, Luxembourg, September 22–26, 2018. Tutorial lectures. (English) Zbl 1398.68041

Lecture Notes in Computer Science 11078. Cham: Springer (ISBN 978-3-030-00337-1/pbk; 978-3-030-00338-8/ebook). xi, 237 p. (2018).
PDF BibTeX XML Cite
Full Text: DOI

Information processing and management of uncertainty in knowledge-based systems. Theory and foundations. 17th international conference, IPMU 2018, Cádiz, Spain, June 11–15, 2018, Proceedings. Part I. (English) Zbl 1481.68019

Communications in Computer and Information Science 853. Cham: Springer (ISBN 978-3-319-91472-5/pbk; 978-3-319-91473-2/ebook). xliv, 806 p. (2018).
MSC:  68-06 68Txx 00B25
PDF BibTeX XML Cite
Full Text: DOI

Information processing and management of uncertainty in knowledge-based systems. Theory and foundations. 17th international conference, IPMU 2018, Cádiz, Spain, June 11–15, 2018. Proceedings. Part II. (English) Zbl 1481.68018

Communications in Computer and Information Science 854. Cham: Springer (ISBN 978-3-319-91475-6/pbk; 978-3-319-91476-3/ebook). xx, 766 p. (2018).
MSC:  68-06 68Txx 00B25
PDF BibTeX XML Cite
Full Text: DOI

Information processing and management of uncertainty in knowledge-based systems. Applications. 17th international conference, IPMU 2018, Cádiz, Spain, June 11–15, 2018, Proceedings, Part III. (English) Zbl 1481.68020

Communications in Computer and Information Science 855. Cham: Springer (ISBN 978-3-319-91478-7/pbk; 978-3-319-91479-4/ebook). xx, 764 p. (2018).
MSC:  68-06 68Txx 00B25
PDF BibTeX XML Cite
Full Text: DOI

Reinforcement learning for optimal feedback control. A Lyapunov-based approach. (English) Zbl 1403.49001

Communications and Control Engineering. Cham: Springer (ISBN 978-3-319-78383-3/hbk; 978-3-319-78384-0/ebook). xvi, 293 p. (2018).
PDF BibTeX XML Cite
Full Text: DOI

Introduction to learning classifier systems. (English) Zbl 1378.68005

SpringerBriefs in Intelligent Systems. Artificial Intelligence, Multiagent Systems, and Cognitive Robotics. Berlin: Springer (ISBN 978-3-662-55006-9/pbk; 978-3-662-55007-6/ebook). xiii, 123 p. (2017).
MSC:  68-01 68T05 68T20
PDF BibTeX XML Cite
Full Text: DOI

Introduction to data science. A Python approach to concepts, techniques and applications. With contributions from Jordi Vitrià, Eloi Puertas Petia Radeva, Oriol Pujol, Sergio Escalera, Francesc Dantí and Lluís Garrido. (English) Zbl 1365.62003

Undergraduate Topics in Computer Science. Cham: Springer (ISBN 978-3-319-50016-4/pbk; 978-3-319-50017-1/ebook). xiv, 218 p. (2017).
PDF BibTeX XML Cite
Full Text: DOI

Information processing and management of uncertainty in knowledge-based systems. 16th international conference, IPMU 2016, Eindhoven, The Netherlands, June 20–24, 2016. Proceedings. Part I. (English) Zbl 1385.68005

Communications in Computer and Information Science 610. Cham: Springer (ISBN 978-3-319-40595-7/pbk; 978-3-319-40596-4/ebook). xxxiv, 738 p. (2016).
MSC:  68-06 68Txx 00B25
PDF BibTeX XML Cite
Full Text: DOI

Information processing and management of uncertainty in knowledge-based systems. 16th international conference, IPMU 2016, Eindhoven, The Netherlands, June 20–24, 2016. Proceedings. Part II. (English) Zbl 1385.68004

Communications in Computer and Information Science 611. Cham: Springer (ISBN 978-3-319-40580-3/pbk; 978-3-319-40581-0/ebook). xxiv, 836 p. (2016).
MSC:  68-06 68Txx 00B25
PDF BibTeX XML Cite
Full Text: DOI

Support vector machines and perceptrons. Learning, optimization, classification, and application to social networks. (English) Zbl 1365.68003

SpringerBriefs in Computer Science. Cham: Springer (ISBN 978-3-319-41062-3/pbk; 978-3-319-41063-0/ebook). xiii, 95 p. (2016).
MSC:  68-02 68T05 91D30
PDF BibTeX XML Cite
Full Text: DOI

Identity-based lossy encryption from learning with errors. (English) Zbl 1398.68136

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 3-20 (2015).
MSC:  68P25
PDF BibTeX XML Cite
Full Text: DOI

Machine learning paradigms. Applications in recommender systems. (English) Zbl 1355.68004

Intelligent Systems Reference Library 92. Cham: Springer (ISBN 978-3-319-19134-8/hbk; 978-3-319-38496-2/pbk; 978-3-319-19135-5/ebook). xv, 125 p. (2015).
PDF BibTeX XML Cite
Full Text: DOI

Fundamentals of machine learning for predictive data analytics. Algorithms, worked examples, and case studies. (English) Zbl 1393.68007

Cambridge, MA: MIT Press (ISBN 978-0-262-02944-5/hbk; 978-0-262-33172-2/ebook). xxii, 595 p. (2015).
MSC:  68-02 68T05
PDF BibTeX XML Cite

Guide to teaching puzzle-based learning. (English) Zbl 1338.97007

Undergraduate Topics in Computer Science. London: Springer (ISBN 978-1-4471-6475-3/pbk; 978-1-4471-6476-0/ebook). xvi, 345 p. (2014).
PDF BibTeX XML Cite
Full Text: DOI

Probabilistic approaches to recommendations. (English) Zbl 1298.68011

Synthesis Lectures on Data Mining and Knowledge Discovery 9. San Rafael, CA: Morgan & Claypool Publishers (ISBN 978-1-62705-257-3/pbk; 978-1-62705-258-0/ebook). xv, 181 p. (2014).
PDF BibTeX XML Cite
Full Text: DOI

Data analysis, machine learning and knowledge discovery. Revised versions of selected papers presented at the 36th annual conference of the German Classification Society, Gesellschaft für Klassifikation, GfKl 2012, Hildesheim, Germany, August 1–3, 2012. (English) Zbl 1301.68022

Studies in Classification, Data Analysis, and Knowledge Organization. Cham: Springer (ISBN 978-3-319-01594-1/pbk; 978-3-319-01595-8/ebook). xxi, 470 p. (2014).
MSC:  68-06 68P01 68T05 68T30 62-07 62P99
PDF BibTeX XML Cite
Full Text: DOI

Realtime data mining. Self-learning techniques for recommendation engines. (English) Zbl 1295.68009

Applied and Numerical Harmonic Analysis. Cham: Birkhäuser/Springer (ISBN 978-3-319-01320-6/hbk; 978-3-319-01321-3/ebook). xxiii, 313 p. (2013).
PDF BibTeX XML Cite
Full Text: DOI

Evolutionary optimization algorithms. Biologically inspired and population-based approaches to computer intelligence. (English) Zbl 1280.68008

Hoboken, NJ: John Wiley & Sons (ISBN 978-0-470-93741-9/hbk). xxx, 742 p. (2013).
PDF BibTeX XML Cite

Unsupervised classification. Similarity measures, classical and metaheuristic approaches, and applications. (English) Zbl 1276.62038

Heidelberg: Springer (ISBN 978-3-642-32450-5/hbk; 978-3-642-32451-2/ebook). xviii, 262 p. (2013).
PDF BibTeX XML Cite
Full Text: DOI

Learning binary hash codes for large-scale image search. (English) Zbl 1251.68268

Cipolla, Roberto (ed.) et al., Machine learning for computer vision. Selected papers based on the presentations at the international computer vision summer school (ICVSS 2012), Sicily, Italy, July 7–15, 2012. Berlin: Springer (ISBN 978-3-642-28660-5/hbk; 978-3-642-28661-2/ebook). Studies in Computational Intelligence 411, 49-87 (2013).
PDF BibTeX XML Cite
Full Text: DOI

EVA-CBTM: Evaluation of computer based online training programs for mathematics. 2nd enlarged ed. (English) Zbl 1258.00005

Mathematiklernen mit Digitalen Medien 1. Münster: WTM-Verlag (ISBN 978-3-942197-23-6/pbk). 81 p. (2012).
PDF BibTeX XML Cite

Spatial autoregression (SAR) model. Parameter estimation technique. (English) Zbl 1248.68015

SpringerBriefs in Computer Science. New York, NY: Springer (ISBN 978-1-4614-1841-2/pbk; 978-1-4614-1842-9/ebook). x, 73 p. (2012).
MSC:  68-02 68T05 62H11
PDF BibTeX XML Cite
Full Text: DOI

Extraction and representation of prosody for speaker, speech and language recognition. (English) Zbl 1244.68005

SpringerBriefs in Speech Technology. New York, NY: Springer (ISBN 978-1-4614-1158-1/hbk; 978-1-4614-1159-8/ebook). x, 61 p. (2012).
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

all top 3

Software