[AI Security] Mimicry Resilient Program Behavior Modeling with LSTM based Branch Models, DEEP LEARNING AND SECURITY WORKSHOP, May2018

Mimicry Resilient Program Behavior Modeling with LSTM based Branch Models, Hayoon Yi, Gyuwan Kimy, Jangho Leey, Sunwoo Ahn, Younghan Lee, Sungroh Yoon, Yunheung Paek, DEEP LEARNING AND SECURITY WORKSHOP 2018

0
0

International Papers

Privacy Enhancing Computing HEPIC: Private Inference over Homomorphic Encryption with Client Intervention, ASPLOS 2026
Privacy Enhancing Computing Towards an Efficient Dataflow-flexible Accelerator by Finding Optimal Dataflows of DNNs, Future Generation Computer Systems, Sep 2025
Privacy Enhancing Computing An Accelerator for Low-computational Overhead Privacy-Preserving GNN Inference, HiPC 2025
Privacy Enhancing Computing SLOTHE: Lazy Approximation of Non-Arithmetic Neural Network Functions over Encrypted Data, USENIX Security 2025
Privacy Enhancing Computing Affinity-based Optimizations for TFHE on Processing-in-DRAM, ASPLOS 2025 Affinity-based Optimizations for TFHE on Processing-in-DRAM, ASPLOS 2025
Privacy Enhancing Computing LOHEN: Layer-wise Optimizations for Neural Network Inferences over Encrypted Data with high Performance or Accuracy, USENIX Security 2025
Privacy Enhancing Computing Affinity-based Optimizations of Homomorphic Encryption Operations on Processing-in-DRAM, DAC WIP 2024