Oblivious {Multi-Party} machine learning on trusted processors O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ... 25th USENIX Security Symposium (USENIX Security 16), 619-636, 2016 | 648 | 2016 |
Privacy-preserving machine learning MSDS Costa, CAMC Fournet, A Mehta, S Nowozin, O Ohrimenko, ... US Patent App. 15/245,141, 2017 | 52 | 2017 |
Qapla: Policy compliance for database-backed systems A Mehta, E Elnikety, K Harvey, D Garg, P Druschel 26th USENIX Security Symposium (USENIX Security 17), 1463-1479, 2017 | 51 | 2017 |
Thoth: Comprehensive policy compliance in data retrieval systems E Elnikety, A Mehta, A Vahldiek-Oberwagner, D Garg, P Druschel 25th USENIX Security Symposium (USENIX Security 16), 637-654, 2016 | 44 | 2016 |
Guardat: Enforcing data policies at the storage layer A Vahldiek-Oberwagner, E Elnikety, A Mehta, D Garg, P Druschel, ... Proceedings of the Tenth European Conference on Computer Systems, 1-16, 2015 | 42 | 2015 |
Listening to Bluetooth beacons for epidemic risk mitigation G Barthe, RD Viti, P Druschel, D Garg, M Gomez-Rodriguez, P Ingo, ... Scientific Reports 12 (1), 5558, 2022 | 12 | 2022 |
Pacer: Comprehensive Network {Side-Channel} Mitigation in the Cloud A Mehta, M Alzayat, R De Viti, BB Brandenburg, P Druschel, D Garg 31st USENIX Security Symposium (USENIX Security 22), 2819-2838, 2022 | 11* | 2022 |
SGX-enabled oblivious machine learning O Ohrimenko, M Costa, C Fournet, S Nowozin, A Mehta, F Schuster, ... | 6 | 2016 |
PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation G Barthe, RD Viti, P Druschel, D Garg, M Gomez-Rodriguez, P Ingo, ... | 5 | 2020 |
Guardat: A foundation for policy-protected data A Vahldiek, E Elnikety, A Mehta, D Garg, P Druschel, A Post, R Rodrigues, ... MPI-SWS, Tech. Rep, 014-002, 2014 | 4 | 2014 |
NetShaper: A Differentially Private Network Side-Channel Mitigation System A Sabzi, R Vora, S Goswami, M Seltzer, M Lécuyer, A Mehta arXiv preprint arXiv:2310.06293, 2023 | 1 | 2023 |
LDPKiT: Recovering Utility in LDP Schemes by Training with Noise^ 2 K Li, Y Xi, A Mehta, D Lie arXiv preprint arXiv:2405.16361, 2024 | | 2024 |
Stream Processing with Adaptive Edge-Enhanced Confidential Computing Y Yan, P Mishra, W Huang, A Mehta, O Balmau, D Lie Proceedings of the 7th International Workshop on Edge Systems, Analytics and …, 2024 | | 2024 |
ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic G Mitra, P Dash, YE Yao, A Mehta, K Pattabiraman arXiv preprint arXiv:2312.06140, 2023 | | 2023 |
Reconciling Security and Utility in Next-Generation Epidemic Risk Mitigation Systems P Ingo, N Boufford, MC Jiang, R Lindsay, R De Viti, M Lentz, G Barthe, ... arXiv preprint arXiv:2011.08069, 2020 | | 2020 |
Ensuring compliance with data privacy and usage policies in online services A Mehta Saarländische Universitäts-und Landesbibliothek, 2020 | | 2020 |
T3: Comprehensive policy compliance in data retrieval systems E Elnikety, A Mehta, A Vahldiek-Oberwanger, D Garg, P Druschel | | 2016 |
Guardat: A foundation for policy-protected persistent data A Vahldiek, E Elnikety, A Mehta, D Garg, P Druschel, J Gehrke, ... | | |