Anderson C. A. Nascimento
Anderson C. A. Nascimento
Head of Security Research - Visa
Verified email at - Homepage
Cited by
Cited by
Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation
M De Cock, R Dowsley, C Horst, R Katti, ACA Nascimento, WS Poon, ...
IEEE Transactions on Dependable and Secure Computing 16 (2), 217-230, 2017
Character level based detection of DGA domain names
B Yu, J Pan, J Hu, A Nascimento, M De Cock
2018 international joint conference on neural networks (IJCNN), 1-8, 2018
Inline DGA detection with deep networks
B Yu, DL Gray, J Pan, M De Cock, ACA Nascimento
2017 IEEE international conference on data mining workshops (ICDMW), 683-692, 2017
Fast, privacy preserving linear regression over distributed datasets based on pre-distributed data
M Cock, R Dowsley, ACA Nascimento, SC Newman
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security …, 2015
Commitment capacity of discrete memoryless channels
A Winter, ACA Nascimento, H Imai
Cryptography and Coding: 9th IMA International Conference, Cirencester, UK …, 2003
Improving quantum secret-sharing schemes
ACA Nascimento, J Mueller-Quade, H Imai
Physical Review A 64 (4), 042311, 2001
Dictionary extraction and detection of algorithmically generated domain names in passive DNS traffic
M Pereira, S Coleman, B Yu, M DeCock, A Nascimento
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
Objetos de aprendizagem: uma proposta de recurso pedagógico
CL Prata, A Nascimento
Brasília: MEC, SEED, 20, 2007
High performance logistic regression for privacy-preserving genome analysis
M De Cock, R Dowsley, ACA Nascimento, D Railsback, J Shen, A Todoki
BMC Medical Genomics 14, 1-18, 2021
Privacy-preserving classification of personal text messages with secure multi-party computation
D Reich, A Todoki, R Dowsley, M De Cock
Advances in Neural Information Processing Systems 32, 2019
IND-CCA secure cryptography based on a variant of the LPN problem
N Döttling, J Müller-Quade, ACA Nascimento
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
On the oblivious-transfer capacity of noisy resources
ACA Nascimento, A Winter
IEEE Transactions on Information Theory 54 (6), 2572-2581, 2008
Objetos de Aprendizagem: a distância entre a promessa e a realidade
ACA Nascimento
Objetos de aprendizagem: uma proposta de recurso pedagógico. Brasília: MEC …, 2007
A CCA2 secure public key encryption scheme based on the McEliece assumptions in the standard model
R Dowsley, J Müller-Quade, ACA Nascimento
Cryptographers’ Track at the RSA Conference, 240-251, 2009
Protecting privacy of users in brain-computer interface applications
A Agarwal, R Dowsley, ND McKinney, D Wu, CT Lin, M De Cock, ...
IEEE Transactions on Neural Systems and Rehabilitation Engineering 27 (8 …, 2019
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
R Tonicelli, ACA Nascimento, R Dowsley, J Müller-Quade, H Imai, ...
International Journal of Information Security 14, 73-84, 2015
A CCA2 secure variant of the McEliece cryptosystem
N Dottling, R Dowsley, J Muller-Quade, ACA Nascimento
IEEE Transactions on Information Theory 58 (10), 6672-6680, 2012
CharBot: A simple and effective method for evading DGA classifiers
J Peck, C Nie, R Sivaguru, C Grumer, F Olumofin, B Yu, A Nascimento, ...
IEEE Access 7, 91759-91771, 2019
An evaluation of DGA classifiers
R Sivaguru, C Choudhary, B Yu, V Tymchenko, A Nascimento, M De Cock
2018 IEEE international conference on big data (big data), 5058-5067, 2018
Oblivious transfer based on the McEliece assumptions
R Dowsley, J Van De Graaf, J Müller-Quade, ACA Nascimento
Information Theoretic Security: Third International Conference, ICITS 2008 …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20