A Secure Digital In-Memory Compute (IMC) Macro with Protections for Side-Channel and Bus Probing AttacksMaitreyi AshokSaurav Majiet al.2024CICC 2024
On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable AssumptionsRomain GayBogdan Ursu2024PKC 2024
DePRL: Achieving Linear Convergence Speedup in Personalized Decentralized Learning with Shared RepresentationsGuojun XiongGang Yanet al.2024AAAI 2024
Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution ShiftShengwei AnSheng-Yen Chouet al.2024AAAI 2024
Unleashing the Power of DRA (Dynamic Resource Allocation) for Just-in-Time GPU SlicingAbhishek MalvankarOlivier Tardieu2024KubeCon EU 2024
Trimaran: Load-Aware Scheduling for Power Efficiency and Performance StabilityAsser TantawiChen Wang2024KubeCon EU 2024
Pragmatic De-Identification of Cross-Domain Unstructured Documents: A Utility-Preserving Approach with Relation Extraction FilteringLiubov NedoshivinaAnisa Halimiet al.2024AMIA Informatics Symposium 2024