2020-12-10 | Maliciously secure matrix multiplication with applications to private deep learning | Chen, Hao; Kim, Miran, et al | CONFERENCE | 23 |
2020-11 | SPARCLE: Streaming Processing Applications over Dispersed Computing Networks | Rahimzadeh, Parisa; Lee, Jinsung, et al | CONFERENCE | 6 |
2020-11 | FluidMem: Full Flexible and Fast Memory Disaggregation for the Cloud | Caldwell, Blake; Im, Youngbin, et al | CONFERENCE | 9 |
2020-10-19 | ST-GRAT: A Novel Spatio-temporal Graph Attention Networks for Accurately Forecasting Dynamically Changing Road Speed | Park, Cheonbok; Lee, Chunggi, et al | CONFERENCE | 14 |
2020-07-15 | FuZZan: Efficient sanitizer metadata design for fuzzing | Jeon, Yuseok; Han, W., et al | CONFERENCE | 11 |
2020-04-27 | GUIComp: A GUI Design Assistant with Real-Time, Multi-Faceted Feedback | Lee, Chunggi; Kim, Sanghoon, et al | CONFERENCE | 104 |
2019-11-11 | Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference | Chen, Hao; Dai, Wei, et al | CONFERENCE | 70 |
2019-03-25 | Polper: Process-aware restriction of over-privileged setuid calls in legacy applications | Jeon, Yuseok; Rhee, J., et al | CONFERENCE | 12 |
2019- 8 | A Full RNS Variant of Approximate Homomorphic Encryption | Cheon, Jung Hee; Han,Kyoohyung, et al | CONFERENCE | 86 |
2018-10-15 | Secure outsourced matrix computation and application to neural networks | Jiang, Xiaoqian; Lauter, Kristin, et al | CONFERENCE | 56 |
2018-09-11 | Hardware Assisted Randomization of Data | Belleville, Brian; Moon, Hyungon, et al | CONFERENCE | 43 |
2018-04-29 | Bootstrapping for approximate homomorphic encryption | Cheon, Jung Hee; Han, Kyoohyung, et al | CONFERENCE | 58 |
2017-12 | Homomorphic encryption for arithmetic of approximate numbers | Cheon, Jung Hee; Kim, Andrey, et al | CONFERENCE | 36 |
2017-10-30 | HexType: Efficient detection of type confusion errors for C++ | Jeon, Yuseok; Biswas, P., et al | CONFERENCE | 14 |
2016-10-24 | TypeSan: Practical type confusion detection | Haller, I.; Jeon, Yuseok, et al | CONFERENCE | 19 |
2016-09-08 | Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems | Kim, Junsoo; Lee, Chanhwa, et al | CONFERENCE | 32 |
2016-05-16 | Automatic Configuration of Mobile Conveyor Lines | Lee, Dohee; Au, Tsz-Chiu | CONFERENCE | 70 |
2016-04-27 | HexType: fast type safety for C++ programs | Jeon, Yuseok; Peng, Hui, et al | CONFERENCE | 13 |
2015-01-30 | Search-and-compute on encrypted data | Cheon, Jung Hee; Kim, Miran, et al | CONFERENCE | 32 |
2015-01-15 | Homomorphic computation of edit distance | Cheon, Jung Hee; Kim, Miran, et al | CONFERENCE | 36 |