default search action
Deeksha Dangwal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [b1]Deeksha Dangwal:
A System-Level Framework for Privacy. University of California, Santa Barbara, USA, 2022 - 2021
- [c9]Deeksha Dangwal, Vincent T. Lee, Hyo Jin Kim, Tianwei Shen, Meghan Cowan, Rajvi Shah, Caroline Trippel, Brandon Reagen, Timothy Sherwood, Vasileios Balntas, Armin Alaghi, Eddy Ilg:
Mitigating Reverse Engineering Attacks on Local Feature Descriptors. BMVC 2021: 106 - [c8]Meghan Cowan, Deeksha Dangwal, Armin Alaghi, Caroline Trippel, Vincent T. Lee, Brandon Reagen:
Porcupine: a synthesizing compiler for vectorized homomorphic encryption. PLDI 2021: 375-389 - [c7]Deeksha Dangwal, Zhizhou Zhang, Jedidiah R. Crandall, Timothy Sherwood:
Context-Aware Privacy-Optimizing Address Tracing. SEED 2021: 150-162 - [i3]Meghan Cowan, Deeksha Dangwal, Armin Alaghi, Caroline Trippel, Vincent T. Lee, Brandon Reagen:
Porcupine: A Synthesizing Compiler for Vectorized Homomorphic Encryption. CoRR abs/2101.07841 (2021) - [i2]Deeksha Dangwal, Meghan Cowan, Armin Alaghi, Vincent T. Lee, Brandon Reagen, Caroline Trippel:
SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing. CoRR abs/2105.00378 (2021) - [i1]Deeksha Dangwal, Vincent T. Lee, Hyo Jin Kim, Tianwei Shen, Meghan Cowan, Rajvi Shah, Caroline Trippel, Brandon Reagen, Timothy Sherwood, Vasileios Balntas, Armin Alaghi, Eddy Ilg:
Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors. CoRR abs/2105.03812 (2021) - 2020
- [j3]Weilong Cui, Georgios Tzimpragos, Yu Tao, Joseph McMahan, Deeksha Dangwal, Nestan Tsiskaridze, George Michelogiannakis, Dilip P. Vasudevan, Timothy Sherwood:
Language Support for Navigating Architecture Design in Closed Form. ACM J. Emerg. Technol. Comput. Syst. 16(1): 9:1-9:28 (2020) - [j2]Deeksha Dangwal, Weilong Cui, Joseph McMahan, Timothy Sherwood:
Trace Wringing for Program Trace Privacy. IEEE Micro 40(3): 108-115 (2020) - [j1]Deeksha Dangwal, Georgios Tzimpragos, Timothy Sherwood:
Agile Hardware Development and Instrumentation With PyRTL. IEEE Micro 40(4): 76-84 (2020) - [c6]Deeksha Dangwal, Meghan Cowan, Armin Alaghi, Vincent T. Lee, Brandon Reagen, Caroline Trippel:
SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing. HASP@MICRO 2020: 8:1-8:9
2010 – 2019
- 2019
- [c5]Deeksha Dangwal, Weilong Cui, Joseph McMahan, Timothy Sherwood:
Safer Program Behavior Sharing Through Trace Wringing. ASPLOS 2019: 1059-1072 - [c4]Dawit Aboye, Dylan Kupsh, Maggie Lim, Jacqueline Mai, Deeksha Dangwal, Diba Mirza, Timothy Sherwood:
PyRTLMatrix: An Object-Oriented Hardware Design Pattern for Prototyping ML Accelerators. EMC2@HPCA/CVPR/ISCA 2019: 36-40 - [c3]Diba Mirza, Deeksha Dangwal, Timothy Sherwood:
PyRTL in Early Undergraduate Research. WCAE@ISCA 2019: 6:1-6:8 - 2018
- [c2]Weilong Cui, Yongshan Ding, Deeksha Dangwal, Adam Holmes, Joseph McMahan, Ali JavadiAbhari, Georgios Tzimpragos, Frederic T. Chong, Timothy Sherwood:
Charm: A Language for Closed-Form High-Level Architecture Modeling. ISCA 2018: 152-165 - 2017
- [c1]John Clow, Georgios Tzimpragos, Deeksha Dangwal, Sammy Guo, Joseph McMahan, Timothy Sherwood:
A pythonic approach for rapid hardware prototyping and instrumentation. FPL 2017: 1-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 23:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint