SQIsign2D-West: The Fast, the Small, and the SaferAndrea BassoPierrick Dartoiset al.2024AsiaCrypt 2024
A Policy Framework for Securing Cloud APIs by Combining Application Context with Generative AIShriti PriyaJulian James Stephen2024ACSAC 2024
On the Semidirect Discrete Logarithm Problem in Finite GroupsChristopher BattarbeeGiacomo Borinet al.2024AsiaCrypt 2024
Membership Inference Attacks Against Time-Series ModelsNoam KorenAbigail Goldsteenet al.2024ACML 2024
FLEdge: Benchmarking Federated Learning Applications in Edge Computing SystemsHerbert WoisetschlägerAlexander Erbenet al.2024Middleware 2024
Cloud-native Workflow Scheduling using a Hybrid Priority Rule, Dynamic Resource Allocation, and Dynamic Task PartitionJungeun ShinDiana Arroyoet al.2024SoCC 2024
Incremental GPU Slicing in ActionAbhishek MalvankarOlivier Tardieu2024CNCF-hosted Co-located Events North America 2024
From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) RideMengmei YeSandhya Koteshwaraet al.2024MICRO 2024
MoJE: Mixture of Jailbreak Experts, Naive Tabular Classifiers as Guard for Prompt AttacksGiandomenico CornacchiaKieran Fraseret al.2024AIES 2024