" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

To Cloud or not to Cloud: A Qualitative Study on {Self-Hosters}'Motivation, Operation, and Security Mindset

L Gröber, R Mrowczynski, N Vijay, DA Muller… - 32nd USENIX Security …, 2023 - usenix.org
Despite readily available cloud services, some people decide to self-host internal or external
services for themselves or their organization. In doing so, a broad spectrum of commercial …

Securing graph neural networks in mlaas: A comprehensive realization of query-based integrity verification

B Wu, X Yuan, S Wang, Q Li, M Xue… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The deployment of Graph Neural Networks (GNNs) within Machine Learning as a Service
(MLaaS) has opened up new attack surfaces and an escalation in security concerns …

Multiuser Privacy and Security Conflicts in the Cloud

E Alhelali, KM Ramokapane, J Such - … of the 2023 CHI Conference on …, 2023 - dl.acm.org
Collaborative cloud platforms make it easier and more convenient for multiple users to work
together on files (GoogleDocs, Office365) and store and share them (Dropbox, OneDrive) …

What users want from cloud deletion and the information they need: A participatory action study

KM Ramokapane, J Such, A Rashid - ACM Transactions on Privacy and …, 2022 - dl.acm.org
Current cloud deletion mechanisms fall short in meeting users' various deletion needs. They
assume all data is deleted the same way—data is temporally removed (or hidden) from …

CareFL: Contribution Guided Byzantine-Robust Federated Learning

Q Dong, S Yang, Z Dai, Y Gao, S Wang… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Byzantine-robust federated learning (FL) endeavors to empower service providers in
acquiring a precise global model, even in the presence of potentially malicious FL clients …

Degrading data to save the planet

A Zuck, D Porter, D Tsafrir - Proceedings of the 19th Workshop on Hot …, 2023 - dl.acm.org
Storage capacity demand is projected to grow exponentially in the coming decade and so
will its contribution to the overall carbon footprint of computing devices. In recent years …

Files of a feather flock together? Measuring and modeling how users perceive file similarity in cloud storage

W Brackenbury, G Harrison, K Chard… - Proceedings of the 44th …, 2021 - dl.acm.org
Prior work suggests that users conceptualize the organization of personal collections of
digital files through the lens of similarity. However, it is unclear to what degree similar files …

Practical cloud storage auditing using serverless computing

F Chen, J Cai, T Xiang, X Liao - Science China Information Sciences, 2024 - Springer
Cloud storage auditing research is dedicated to solving the data integrity problem of
outsourced storage on the cloud. In recent years, researchers have proposed various cloud …

Summarizing Sets of Related ML-Driven Recommendations for Improving File Management in Cloud Storage

W Brackenbury, K Chard, A Elmore, B Ur - Proceedings of the 35th …, 2022 - dl.acm.org
Personal cloud storage systems increasingly offer recommendations to help users retrieve
or manage files of interest. For example, Google Drive's Quick Access predicts and surfaces …