Synthical
Your space
Profile
Activity
Favorites
Folders
Feeds
All articles
Claim page
Andrew Paverd
Follow
Activity
Upvotes
Folders
Articles
26
ExclaveFL: Providing Transparency to Federated Learning using Exclaves
13 December 2024 by
Jinnan Guo
and
others
Cryptography and Security
,
Distributed, Parallel, and Cluster Computing
Are you still on track!? Catching LLM Task Drift with Activations
3 November 2024 by
Sahar Abdelnabi
and
others
Cryptography and Security
,
Computation and Language
Permissive Information-Flow Analysis for Large Language Models
4 October 2024 by
Shoaib Ahmed Siddiqui
and
others
Machine Learning
,
Artificial Intelligence
Closed-Form Bounds for DP-SGD against Record-level Inference
22 February 2024 by
Giovanni Cherubin
and
others
Cryptography and Security
,
Machine Learning
On the Efficacy of Differentially Private Few-shot Image Classification
19 December 2023 by
Marlon Tobaben
and
others
Machine Learning
,
Cryptography and Security
Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective
27 November 2023 by
Lukas Wutschitz
and
others
Machine Learning
,
Cryptography and Security
An Empirical Study & Evaluation of Modern CAPTCHAs
22 July 2023 by
Andrew Searles
and
others
at
UC Irvine
Cryptography and Security
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
20 April 2023 by
Ahmed Salem
and
others
Machine Learning
,
Cryptography and Security
Bayesian Estimation of Differential Privacy
15 June 2022 by
Santiago Zanella-Beguelin
and
others
at
Microsoft Research
Machine Learning
,
Cryptography and Security
Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement
31 May 2022 by
Alex Shamis
and
others
Distributed, Parallel, and Cluster Computing
,
Cryptography and Security
CTR: Checkpoint, Transfer, and Restore for Secure Enclaves
30 May 2022 by
Yoshimichi Nakatsuka
and
others
Cryptography and Security
,
Systems and Control
Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web
20 May 2022 by
Avinash Sudhodanan
and
Andrew Paverd
Cryptography and Security
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests
2 February 2022 by
Scott Jordan
and
others
Cryptography and Security
CACTI: Captcha Avoidance via Client-side TEE Integration
20 July 2020 by
Yoshimichi Nakatsuka
and
others
Cryptography and Security
PDoT: Private DNS-over-TLS with TEE Support
25 September 2019 by
Yoshimichi Nakatsuka
and
others
Cryptography and Security
S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX
14 October 2018 by
Fritz Alder
and
others
Cryptography and Security
Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization
20 August 2018 by
Shohreh Hosseinzadeh
and
others
Cryptography and Security
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials
2 June 2018 by
Arseny Kurnikov
and
others
Cryptography and Security
SafeKeeper: Protecting Web Passwords using Trusted Execution Environments
23 April 2018 by
Klaudia Krawiecka
and
others
Cryptography and Security
Migrating SGX Enclaves with Persistent State
29 March 2018 by
Fritz Alder
and
others
Cryptography and Security
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
12 March 2018 by
Thomas Nyman
and
others
Cryptography and Security
Towards Linux Kernel Memory Safety
17 October 2017 by
Elena Reshetova
and
others
at
Aalto University
Cryptography and Security
,
Operating Systems
Formal Analysis of V2X Revocation Protocols
6 August 2017 by
Jorden Whitefield
and
others
Cryptography and Security
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware
12 June 2017 by
Ghada Dessouky
and
others
Cryptography and Security
Security in Automotive Networks: Lightweight Authentication and Authorization
15 March 2017 by
Philipp Mundhenk
and
others
Cryptography and Security
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices
30 September 2016 by
Andrew Paverd
and
others
Cryptography and Security
C-FLAT: Control-FLow ATtestation for Embedded Systems Software
17 August 2016 by
Tigist Abera
and
others
Cryptography and Security
The Circle Game: Scalable Private Membership Test Using Trusted Hardware
27 June 2016 by
Sandeep Tamrakar
and
others
at
Aalto University
Cryptography and Security
This is an AI-generated summary
Key points
Topics
Cryptography and Security
Machine Learning
Systems and Control
Computation and Language
Computers and Society
Computer Science and Game Theory
Distributed, Parallel, and Cluster Computing
Operating Systems