SW Security KVSEV: Secure In-Memory Key-Value Store on AMD Secure Encrypted Virtualization, SoCC 2023
|
AI Security FLGuard: Byzantine-Robust Federated Learning via Ensemble of Contrastive Models, ESORICS 2023
|
SW Security ZOMETAG: Zone-based Memory Tagging for Fast, Deterministic Detection of Spatial Memory Violations on ARM, IEEE Transactions on Information Forensics and Security (Impact Factor: 7.23)
|
HW Security Area-Efficient Accelerator for the Full NTRU-KEM Algorithm, ICCSA 2023
|
AI Security Exploring Clustered Federated Learning’s Vulnerability against Property Inference Attack, RAID 2023
|
Application Specific Architectures Modeling and Library Support for Early-stage Exploration of Sparse Tensor Accelerator Designs, IEEE Access, May 2023
|
SW Security SFITAG: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel Extensions, ASIACCS 2023
|
SW Security TRUST: A compilation framework for in-process isolation to protect safe rust against untrusted code, USENIX Security 2023
|
SW Security Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning, ACSAC 2022
|
HW Security Accelerating N-bit Operations over TFHE on Commodity CPU-FPGA, ICCAD 2022
|
SW Security Exploring Effective Uses of the Tagged Memory for Reducing Bounds Checking Overheads (early access), The Journal of Supercomputing, July 2022
|
AI Security Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices, ESORICS 2022
|
AI Security A pilot study of machine-learning-based algorithms to assist integrated care for older community-dwelling adults, Computers, Informatics, Nursing (CIN), Feb 2022
|
AI Security A Data Embedding Scheme for Efficient Program Behavior Modeling with Neural Networks (early access), IEEE Transactions on Emerging Topics in Computational Intelligence (Impact Factor: 8.28), May 2022
|
HW Security A Hardware Platform for Ensuring OS Kernel Integrity on RISC-V, MDPI Electronics, August 2021
|
AI Security Panop: Mimicry-Resistant ANN-based Distributed NIDS for IoT Networks, IEEE Access, July 2021
|
AI Security Learn2Evade: Learning-based Generative Model for Evading PDF Malware Classifiers, IEEE Transactions on Artificial Intelligence, July 2021
|
HW Security Ambassy: A Runtime Framework to Delegate Trusted Applications in an ARM/FPGA Hybrid System (early access), IEEE Transactions on Mobile Computing (TMC), Jun 2021
|
HW Security MeetGo: A Trusted Execution Environment for Remote Applications on FPGA (early access), IEEE Access, Mar 2021
|
SW Security ExpRace: Exploiting Kernel Races through Raising Interrupts (conditional accept), USENIX Security Symposium (Security), August 2021
|