Seguir
Anderson C. A. Nascimento
Anderson C. A. Nascimento
Head of Security Research - Visa
Email confirmado em visa.com - Página inicial
Título
Citado por
Citado por
Ano
Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation
M De Cock, R Dowsley, C Horst, R Katti, ACA Nascimento, WS Poon, ...
IEEE Transactions on Dependable and Secure Computing 16 (2), 217-230, 2017
1692017
Character level based detection of DGA domain names
B Yu, J Pan, J Hu, A Nascimento, M De Cock
2018 International Joint Conference on Neural Networks (IJCNN), 1-8, 2018
1582018
Inline DGA detection with deep networks
B Yu, DL Gray, J Pan, M De Cock, ACA Nascimento
2017 IEEE international conference on data mining workshops (ICDMW), 683-692, 2017
1342017
Fast, privacy preserving linear regression over distributed datasets based on pre-distributed data
M Cock, R Dowsley, ACA Nascimento, SC Newman
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security …, 2015
1212015
Commitment capacity of discrete memoryless channels
A Winter, ACA Nascimento, H Imai
IMA International Conference on Cryptography and Coding, 35-51, 2003
1182003
Improving quantum secret-sharing schemes
ACA Nascimento, J Mueller-Quade, H Imai
Physical Review A 64 (4), 042311, 2001
1022001
Dictionary extraction and detection of algorithmically generated domain names in passive DNS traffic
M Pereira, S Coleman, B Yu, M DeCock, A Nascimento
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
852018
High performance logistic regression for privacy-preserving genome analysis
M De Cock, R Dowsley, ACA Nascimento, D Railsback, J Shen, A Todoki
BMC Medical Genomics 14, 1-18, 2021
742021
On the oblivious-transfer capacity of noisy resources
ACA Nascimento, A Winter
IEEE Transactions on Information Theory 54 (6), 2572-2581, 2008
70*2008
IND-CCA secure cryptography based on a variant of the LPN problem
N Döttling, J Müller-Quade, ACA Nascimento
International Conference on the Theory and Application of Cryptology and …, 2012
692012
Protecting privacy of users in brain-computer interface applications
A Agarwal, R Dowsley, ND McKinney, D Wu, CT Lin, M De Cock, ...
IEEE Transactions on Neural Systems and Rehabilitation Engineering 27 (8 …, 2019
672019
CharBot: A simple and effective method for evading DGA classifiers
J Peck, C Nie, R Sivaguru, C Grumer, F Olumofin, B Yu, A Nascimento, ...
IEEE Access 7, 91759-91771, 2019
612019
Privacy-preserving classification of personal text messages with secure multi-party computation
D Reich, A Todoki, R Dowsley, M De Cock
Advances in Neural Information Processing Systems 32, 2019
612019
Objetos de Aprendizagem: a distância entre a promessa e a realidade
ACA Nascimento
Objetos de aprendizagem: uma proposta de recurso pedagógico. Brasília: MEC …, 2007
612007
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
R Tonicelli, ACA Nascimento, R Dowsley, J Müller-Quade, H Imai, ...
International Journal of Information Security 14, 73-84, 2015
59*2015
A CCA2 secure variant of the McEliece cryptosystem
N Dottling, R Dowsley, J Muller-Quade, ACA Nascimento
IEEE Transactions on Information Theory 58 (10), 6672-6680, 2012
592012
An evaluation of DGA classifiers
R Sivaguru, C Choudhary, B Yu, V Tymchenko, A Nascimento, M De Cock
2018 IEEE international conference on big data (big data), 5058-5067, 2018
582018
A CCA2 secure public key encryption scheme based on the McEliece assumptions in the standard model
R Dowsley, J Müller-Quade, ACA Nascimento
Cryptographers’ Track at the RSA Conference, 240-251, 2009
582009
CQR codes: Colored quick-response codes
MEV Melgar, A Zaghetto, B Macchiavello, ACA Nascimento
2012 IEEE Second International Conference on Consumer Electronics-Berlin …, 2012
512012
Oblivious transfer based on the McEliece assumptions
R Dowsley, J Van De Graaf, J Müller-Quade, ACA Nascimento
Information Theoretic Security: Third International Conference, ICITS 2008 …, 2008
502008
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20