Cited By
View all- Lim HKim JLee HLuo BLiao XXu JKirda ELie D(2024)uMMU: Securing Data Confidentiality with Unobservable Memory SubsystemProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690340(2993-3007)Online publication date: 2-Dec-2024
- Lam MJohnson JXiong WMaeng KGupta ULi YLai LLeontiadis IRhu MLee HReddi VWei GBrooks DSuh ETsafrir DMUSUVATHI MGupta RAbu-Ghazaleh N(2024)GPU-based Private Information Retrieval for On-Device Machine Learning InferenceProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 110.1145/3617232.3624855(197-214)Online publication date: 27-Apr-2024
- Rajat RWang YAnnavaram MSolihin YHeinrich M(2023)LAORAM: A Look Ahead ORAM Architecture for Training Large Embedding TablesProceedings of the 50th Annual International Symposium on Computer Architecture10.1145/3579371.3589111(1-15)Online publication date: 17-Jun-2023
- Show More Cited By