29 results on '"Prateek Saxena"'
Search Results
2. CLUE-MARK: Watermarking Diffusion Models using CLWE.
3. Capstone: A Capability-based Foundation for Trustless Secure Memory Access (Extended Version).
4. RETEXO: Scalable Neural Network Training over Distributed Graphs.
5. User-customizable Transpilation of Scripting Languages.
6. Attacking Byzantine Robust Aggregation in High Dimensions.
7. Membership Inference Attacks and Generalization: A Causal Perspective.
8. LPGNet: Link Private Graph Networks for Node Classification.
9. Private Hierarchical Clustering in Federated Networks.
10. SmashEx: Smashing SGX Enclaves Using Exceptions.
11. Refined Grey-Box Fuzzing with SIVO.
12. SynGuar: Guaranteeing Generalization in Programming by Example.
13. Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.
14. Dynamic Binary Translation for SGX Enclaves.
15. Localizing Patch Points From One Exploit.
16. EPIE Dataset: A Corpus For Possible Idiomatic Expressions.
17. Elasticlave: An Efficient Memory Model for Enclaves.
18. Epione: Lightweight Contact Tracing with Strong Privacy.
19. Binary Compatibility For SGX Enclaves.
20. Scalable Quantitative Verification For Deep Neural Networks.
21. Quantitative Verification of Neural Networks And its Security Applications.
22. Practical Verifiable In-network Filtering for DDoS defense.
23. OHIE: Blockchain Scaling Made Simple.
24. Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution.
25. BesFS: Mechanized Proof of an Iago-Safe Filesystem for Enclaves.
26. Exploiting The Laws of Order in Smart Contracts.
27. Finding The Greedy, Prodigal, and Suicidal Contracts at Scale.
28. How to verify computation with a rational network.
29. Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.