Personensuche
X
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
3
Geometry of Sensitivity: Twice Sampling and Hybrid Clipping..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
4
A Theory to Instruct Differentially-Private Learning via Cl..:
, In:
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
5
PAC Privacy: Automatic Privacy Measurement and Control of D..:
, In:
?
Proceedings of the 49th Annual International Symposium on Computer Architecture ,
7
CraterLake : a hardware accelerator for efficient unboun..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
8
Designing Hardware for Cryptography and Cryptography for Ha..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
9
Private Approximate Nearest Neighbor Search with Sublinear ..:
, In:
?
Proceedings of the 2022 International Conference on Management of Data ,
10
Litmus: Towards a Practical Database Management System with..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
11
ShorTor: Improving Tor Network Latency via Multi-hop Overla..:
, In:
?
Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems ,
12
Robomorphic computing: a design methodology for domain-spec..:
, In:
?
MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture ,
13
F1: A Fast and Programmable Accelerator for Fully Homomorph..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
14
Expected Constant Round Byzantine Broadcast Under Dishonest..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
15