Password-Protected Key Retrieval with(out) HSM ProtectionSebastian FallerTobias Handirket al.2024CCS 2024
A Secure Multiparty Computation Platform for Squeaky-Clean Data RoomsPankaj DayamaVinayaka Panditet al.2024CCS 2024
Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of MaterialsYue XiaoAdwait Nadkarniet al.2024CCS 2024
Privacy-Preserving Training of Monocular Depth Estimators via Self-Supervised Federated LearningElton Figueiredo de Souza SoaresCarlos Alberto Viera Campos2024VTC Fall 2024
Towards Continual Federated Learning of Monocular Depth for Autonomous VehiclesElton Figueiredo de Souza SoaresCarlos Alberto Viera Campos2024VTC Fall 2024
Leveraging Bayesian Optimization to Enhance Self-Supervised Federated Learning of Monocular Depth EstimatorsElton Figueiredo de Souza SoaresEmilio Ashton Vital Brazilet al.2024ITSC 2024
Disaggregated RDDs: Extending and Analyzing Apache Spark for Memory Disaggregated InfrastructuresAchilleas TzenetopoulosMichele Gazzettiet al.2024IC2E 2024
Dynamic Possible Source Count Analysis for Data Leakage PreventionEri OgawaTetsuro Yamazakiet al.2024MPLR 2024
WannaLaugh: A Configurable Ransomware EmulatorDionysios DiamantopoulosRoman Pletkaet al.2024SYSTOR 2024