Fully Homomorphic Encryption for Computer Architects: A Fundamental Characterization StudySubhankar PalKarthik Swaminathanet al.2023MICRO 2023
2nd Workshop on Data Integrity and Secure Cloud Computing (DISCC)Pradip BoseJennifer Dworaket al.2023MICRO 2023
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion DetectionIsaiah J. KingXiaokui Shuet al.2023RAID 2023
Are GNNs the Right Tool to Mine the Blockchain? The Case of the Bitcoin Generator ScamZhikun YuenPaula Brancoet al.2023DSAA 2023
Composable Oblivious Pseudo-Random Functions via Garbled CircuitsSebastian FallerAstrid Ottenhueset al.2023LatinCrypt 2023
RCD-SGD: Resource-Constrained Distributed SGD in Heterogeneous Environment Via Submodular PartitioningHaoze HeParijat Dube2023ICCV 2023
Incorporating Signal Awareness in Source Code Modeling: An Application to Vulnerability DetectionSahil SunejaYufan Zhuanget al.2023ACM TOSEM
Efficient Pruning for Machine Learning under Homomorphic EncryptionEhud AharoniMoran Baruchet al.2023ESORICS 2023
Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized SmoothingDaniel GibertGiulio Zizzoet al.2023ESORICS 2023