no code implementations • 4 Feb 2021 • Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun
The majority of smartphones either run iOS or Android operating systems.
Cryptography and Security
no code implementations • 25 Jun 2019 • Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, Prateek Saxena
Neural networks are increasingly employed in safety-critical domains.
1 code implementation • 4 Jan 2019 • Deli Gong, Muoi Tran, Shweta Shinde, Hao Jin, Vyas Sekar, Prateek Saxena, Min Suk Kang
In this paper, we show the technical feasibility of verifiable in-network filtering, called VIF, that offers filtering verifiability to DDoS victims and neighbor ASes.
Cryptography and Security
no code implementations • 1 Oct 2018 • Karan Grover, Shruti Tople, Shweta Shinde, Ranjita Bhagwan, Ramachandran Ramjee
In this paper, we ask a timely question: "Can third-party cloud services use Intel SGX enclaves to provide practical, yet secure DNN Inference-as-a-service?"