Understanding the Error Sensitivity of Privacy-Aware ComputingMatías MazzantiEsteban Mocskoset al.2025ISCA 2025
Expanding SoCurity for NoC-level Reliability MonitoringNaorin HossainAlper Buyuktosunogluet al.2025ISCA 2025
Scalable Physical Design for Many-Accelerator SoCsKarthik SwaminathanMartin Cochetet al.2025ISCA 2025
A Near-DRAM Accelerator for Compiler-Generated Fully Homomorphic Encryption ApplicationsAlper Buyuktosunoglu2025ISCA 2025
Agile Design of Secure and Resilient AI-Centric SystemsLuca CarloniJoseph Zuckermanet al.2025ISCA 2025
Security and Resilience Challenges in AI-Centric SystemsNaorin HossainKarthik Swaminathanet al.2025ISCA 2025
Practical Cloud Native Compliance Automation with OSCAL CompassTakumi YanagawaChris Butler2025KubeCon Japan 2025
Learning Personalized and Context-Aware Violation Detection Rules in Trigger-Action AppsMahsa SaeidiSai Sree Laya Chukkapalliet al.2025SECRYPT 2025
Combining Explainable Artificial Intelligence (Xai) With Blockchain Towards Trustworthy Data-Driven Policies PDFKonstantinos MavrogiorgosShlomit Guret al.2025DCOSS-IoT 2025