A Secure Multiparty Computation Platform for Squeaky-Clean Data RoomsPankaj DayamaVinayaka Panditet al.2024CCS 2024
Exploring Vulnerabilities in LLMs: A Red Teaming Approach to Evaluate Social BiasYuya Jeremy OngJay Pankaj Galaet al.2024IEEE CISOSE 2024
Securing AI Inference in the Cloud: Is CPU-GPU Confidential Computing Ready ?Apoorve MohanMengmei Yeet al.2024CLOUD 2024
Machine Unlearning in Computer Vision: Foundations and ApplicationsSijia LiuYang Liuet al.2024CVPR 2024
Ultra-Compact Computing at the Edge Involving Unobtrusively Small Sub-millimeter Heterogeneous Integration PackagingFrank LibschSteve Bedellet al.2024ECTC 2024
Pragmatic De-Identification of Cross-Domain Unstructured Documents: A Utility-Preserving Approach with Relation Extraction FilteringLiubov NedoshivinaAnisa Halimiet al.2024AMIA Informatics Symposium 2024
Advancements in Quantum Computing—Viewpoint: Building Adoption and Competency in IndustrySieglinde PfaendlerKonstantin Konsonet al.2024Datenbank-Spektrum
QOMPLIANCE: Declarative Data-Centric Policy ComplianceDaan OudejansAnton Zorinet al.2023IEEE CSDE 2023