Anderson C. A. Nascimento

Orcid: 0000-0002-8298-6250

According to our database1, Anderson C. A. Nascimento authored at least 96 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure Multi-Party Computation for Personalized Human Activity Recognition.
Neural Process. Lett., June, 2023

An End-to-End Framework for Private DGA Detection as a Service.
IACR Cryptol. ePrint Arch., 2023

Enhancing Peak Network Traffic Prediction via Time-Series Decomposition.
CoRR, 2023

A Decentralized Information Marketplace Preserving Input and Output Privacy.
Proceedings of the Second ACM Data Economy Workshop, 2023

2022
Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation.
IEEE Trans. Inf. Forensics Secur., 2022

Privacy-preserving training of tree ensembles over continuous data.
Proc. Priv. Enhancing Technol., 2022

Training Differentially Private Models with Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2022

Secure Multiparty Computation for Synthetic Data Generation from Distributed Data.
CoRR, 2022

PrivFairFL: Privacy-Preserving Group Fairness in Federated Learning.
CoRR, 2022

2021
Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy.
IACR Cryptol. ePrint Arch., 2021

Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines.
IACR Cryptol. ePrint Arch., 2021

Information-Theoretically Secure String Commitments Based on Packet Reordering Channels.
IEEE Access, 2021

Anomaly Detection Technique for Intrusion Detection in SDN Environment using Continuous Data Stream Machine Learning Algorithms.
Proceedings of the IEEE International Systems Conference, 2021

Clustering Analysis of Email Malware Campaigns.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
On the Commitment Capacity of Unfair Noisy Channels.
IEEE Trans. Inf. Theory, 2020

Performability evaluation of transport modes for cloud-based inbound logistics: a study based on coffee industry.
Int. J. Manuf. Technol. Manag., 2020

High Performance Logistic Regression for Privacy-Preserving Genome Analysis.
IACR Cryptol. ePrint Arch., 2020

On the Composability of Statistically Secure Random Oblivious Transfer.
Entropy, 2020

Inline Detection of DGA Domains Using Side Information.
IEEE Access, 2020

2019
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation.
IEEE Trans. Dependable Secur. Comput., 2019

Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection.
IACR Cryptol. ePrint Arch., 2019

Protecting Privacy of Users in Brain-Computer Interface Applications.
CoRR, 2019

Weakly Supervised Deep Learning for the Detection of Domain Generation Algorithms.
IEEE Access, 2019

CharBot: A Simple and Effective Method for Evading DGA Classifiers.
IEEE Access, 2019

Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

A Framework for Network Intrusion Detection using Network Programmability and Data Stream Clustering Machine Learning Algorithms.
Proceedings of the Preprints of Communication Papers of the 2019 Federated Conference on Computer Science and Information Systems, 2019

Cost-adaptive Neural Networks for Peak Volume Prediction with EMM Filtering.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Hardening DGA Classifiers Utilizing IVAP.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Commitment and Oblivious Transfer in the Bounded Storage Model With Errors.
IEEE Trans. Inf. Theory, 2018

VirtualIdentity: Privacy-Preserving User Profiling.
CoRR, 2018

Algorithmically Generated Domain Detection and Malware Family Classification.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Detecting Misogynous Tweets.
Proceedings of the Third Workshop on Evaluation of Human Language Technologies for Iberian Languages (IberEval 2018) co-located with 34th Conference of the Spanish Society for Natural Language Processing (SEPLN 2018), 2018

Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Character Level based Detection of DGA Domain Names.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Detecting Hate Speech Against Women in English Tweets.
Proceedings of the Sixth Evaluation Campaign of Natural Language Processing and Speech Tools for Italian. Final Workshop (EVALITA 2018) co-located with the Fifth Italian Conference on Computational Linguistics (CLiC-it 2018), 2018

An Evaluation of DGA Classifiers.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Privacy-Preserving User Profiling with Facebook Likes.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Privacy-Preserving Linear Regression for Brain-Computer Interface Applications.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability.
IEEE Trans. Inf. Theory, 2017

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM.
IACR Cryptol. ePrint Arch., 2017

Privacy-ensuring electronic health records in the cloud.
Concurr. Comput. Pract. Exp., 2017

Inline DGA Detection with Deep Networks.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

2016
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra.
IEEE Trans. Inf. Forensics Secur., 2016

A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.
Sensors, 2016

Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation.
IACR Cryptol. ePrint Arch., 2016

VirtualIdentity: Privacy preserving user profiling.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.
Int. J. Inf. Sec., 2015

Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.
Comput. J., 2015

Performability Assessment of a Government Process in the Cloud.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols.
Proceedings of the Provable Security, 2015

Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015

2014
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2014

Transport mode assessment for inbound logistics: A study based on coffee industry.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Oblivious transfer in the bounded storage model with errors.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Road network compression techniques in spatiotemporal embedded systems: a survey.
Proceedings of the 5th ACM SIGSPATIAL International Workshop on GeoStreaming, 2014

Universally Composable Oblivious Transfer Based on a Variant of LPN.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2012
A CCA2 Secure Variant of the McEliece Cryptosystem.
IEEE Trans. Inf. Theory, 2012

Oblivious Transfer Based on the McEliece Assumptions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions.
Proceedings of the Information Theoretic Security - 6th International Conference, 2012

CQR codes: Colored quick-response codes.
Proceedings of the IEEE Second International Conference on Consumer Electronics - Berlin, 2012

IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model.
IEEE Trans. Inf. Theory, 2011

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A Fault Analytic Method against HB<sup>+</sup>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A Framework for Secure Single Sign-On.
IACR Cryptol. ePrint Arch., 2011

Efficient fully simulatable oblivious transfer from the McEliece assumptions.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

2010
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product.
IACR Cryptol. ePrint Arch., 2010

A Fault Analytic Method against HB+.
IACR Cryptol. ePrint Arch., 2010

Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption.
Proceedings of the Information Security - 13th International Conference, 2010

2009
A Novel Probabilistic Passive Attack on the Protocols HB and HB<sup>+</sup>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2009

2008
On the Oblivious-Transfer Capacity of Noisy Resources.
IEEE Trans. Inf. Theory, 2008

The Commitment Capacity of the Gaussian Channel Is Infinite.
IEEE Trans. Inf. Theory, 2008

A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model.
IACR Cryptol. ePrint Arch., 2008

On the Composability of Statistically Secure Bit Commitments.
IACR Cryptol. ePrint Arch., 2008

A Novel Probabilistic Passive Attack on the Protocols HB and HB+.
IACR Cryptol. ePrint Arch., 2008

2007
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
On the Oblivious Transfer Capacity of Noisy Correlations.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

On the Oblivious Transfer Capacity of the Erasure Channel.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Bit Commitment over Gaussian Channels.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

IP/WDM Optical Network Testbed: Design and Implementation.
Proceedings of the Management of Convergence Networks and Services, 2006

2005
An information theoretical model for quantum secret sharing.
Quantum Inf. Comput., 2005

Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

2004
Rates for bit commitment and coin tossing from noisy correlation.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Bit String Commitment Reductions with a Non-zero Rate.
Proceedings of the Topics in Cryptology, 2004

Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004

Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Commitment Capacity of Discrete Memoryless Channels.
IACR Cryptol. ePrint Arch., 2003

Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003

Unconditionally Secure Homomorphic Pre-distributed Commitments.
Proceedings of the Applied Algebra, 2003

2002
Cryptography with information theoretic security.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

2001
Quantum Identification Protocol with Technologically Bounded Parties.
Electron. Notes Discret. Math., 2001


  Loading...