Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation M De Cock, R Dowsley, C Horst, R Katti, ACA Nascimento, WS Poon, ... IEEE Transactions on Dependable and Secure Computing 16 (2), 217-230, 2017 | 151 | 2017 |
Character level based detection of DGA domain names B Yu, J Pan, J Hu, A Nascimento, M De Cock 2018 international joint conference on neural networks (IJCNN), 1-8, 2018 | 136 | 2018 |
Inline DGA detection with deep networks B Yu, DL Gray, J Pan, M De Cock, ACA Nascimento 2017 IEEE international conference on data mining workshops (ICDMW), 683-692, 2017 | 127 | 2017 |
Fast, privacy preserving linear regression over distributed datasets based on pre-distributed data M Cock, R Dowsley, ACA Nascimento, SC Newman Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security …, 2015 | 112 | 2015 |
Commitment capacity of discrete memoryless channels A Winter, ACA Nascimento, H Imai Cryptography and Coding: 9th IMA International Conference, Cirencester, UK …, 2003 | 112 | 2003 |
Improving quantum secret-sharing schemes ACA Nascimento, J Mueller-Quade, H Imai Physical Review A 64 (4), 042311, 2001 | 103 | 2001 |
Dictionary extraction and detection of algorithmically generated domain names in passive DNS traffic M Pereira, S Coleman, B Yu, M DeCock, A Nascimento Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 80 | 2018 |
Objetos de aprendizagem: uma proposta de recurso pedagógico CL Prata, A Nascimento Brasília: MEC, SEED, 20, 2007 | 79 | 2007 |
High performance logistic regression for privacy-preserving genome analysis M De Cock, R Dowsley, ACA Nascimento, D Railsback, J Shen, A Todoki BMC Medical Genomics 14, 1-18, 2021 | 65 | 2021 |
Privacy-preserving classification of personal text messages with secure multi-party computation D Reich, A Todoki, R Dowsley, M De Cock Advances in Neural Information Processing Systems 32, 2019 | 65 | 2019 |
IND-CCA secure cryptography based on a variant of the LPN problem N Döttling, J Müller-Quade, ACA Nascimento Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 65 | 2012 |
On the oblivious-transfer capacity of noisy resources ACA Nascimento, A Winter IEEE Transactions on Information Theory 54 (6), 2572-2581, 2008 | 64* | 2008 |
Objetos de Aprendizagem: a distância entre a promessa e a realidade ACA Nascimento Objetos de aprendizagem: uma proposta de recurso pedagógico. Brasília: MEC …, 2007 | 60 | 2007 |
A CCA2 secure public key encryption scheme based on the McEliece assumptions in the standard model R Dowsley, J Müller-Quade, ACA Nascimento Cryptographers’ Track at the RSA Conference, 240-251, 2009 | 59 | 2009 |
Protecting privacy of users in brain-computer interface applications A Agarwal, R Dowsley, ND McKinney, D Wu, CT Lin, M De Cock, ... IEEE Transactions on Neural Systems and Rehabilitation Engineering 27 (8 …, 2019 | 56 | 2019 |
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model R Tonicelli, ACA Nascimento, R Dowsley, J Müller-Quade, H Imai, ... International Journal of Information Security 14, 73-84, 2015 | 56* | 2015 |
A CCA2 secure variant of the McEliece cryptosystem N Dottling, R Dowsley, J Muller-Quade, ACA Nascimento IEEE Transactions on Information Theory 58 (10), 6672-6680, 2012 | 56 | 2012 |
CharBot: A simple and effective method for evading DGA classifiers J Peck, C Nie, R Sivaguru, C Grumer, F Olumofin, B Yu, A Nascimento, ... IEEE Access 7, 91759-91771, 2019 | 55 | 2019 |
An evaluation of DGA classifiers R Sivaguru, C Choudhary, B Yu, V Tymchenko, A Nascimento, M De Cock 2018 IEEE international conference on big data (big data), 5058-5067, 2018 | 54 | 2018 |
Oblivious transfer based on the McEliece assumptions R Dowsley, J Van De Graaf, J Müller-Quade, ACA Nascimento Information Theoretic Security: Third International Conference, ICITS 2008 …, 2008 | 50 | 2008 |