Sok: Hardware-supported trusted execution environments
The growing complexity of modern computing platforms and the need for strong isolation
protections among their software components has led to the increased adoption of Trusted …
protections among their software components has led to the increased adoption of Trusted …
Confidential machine learning computation in untrusted environments: A systems security perspective
As machine learning (ML) technologies and applications are rapidly changing many
computing domains, security issues associated with ML are also emerging. In the domain of …
computing domains, security issues associated with ML are also emerging. In the domain of …
Trusted Computing on Modern Platforms: Analysis, Challenges, and Implications
M Schneider - 2024 - research-collection.ethz.ch
Computing architectures come in all forms and shapes, and they impact our daily lives
significantly. Smartphones are omnipresent, most jobs require daily interactions with …
significantly. Smartphones are omnipresent, most jobs require daily interactions with …
Virtualization Framework for Securing Cloud to 5G Networks Using Ant Lion Optimization Constructed KGMO for Mobility Supervision
L Sarala, T Mahalakshmi, SM Kandarkar… - … in Engineering and …, 2023 - ieeexplore.ieee.org
Due to the ever-increasing demands of mobile data traffic, network densification is
recognised as a crucial factor in the evolution of cellular networks. Ultra-dense …
recognised as a crucial factor in the evolution of cellular networks. Ultra-dense …
A Review of GPU Virtualization Technology Based on API Redirection
Y Zhao, Z Gao, Z Wu, L Xu - 2023 5th International Academic …, 2023 - ieeexplore.ieee.org
With the continuous development of cloud computing, artificial intelligence and other
technologies, the importance of GPU virtualization technology has been continuously …
technologies, the importance of GPU virtualization technology has been continuously …
Research on Processing-In-Memory Isolation for Trusted execution environment
JW Baek, YP Cho - Annual Conference of KIPS, 2024 - koreascience.kr
오늘날 데이터 보안이 점점 중요한 요소로 강조되고 있으며, 기술의 발전에 따라 데이터 중심의
워크로드 증가로 인해 메모리 대역폭의 병목 현상의 문제로 데이터 처리 속도의 제약이 …
워크로드 증가로 인해 메모리 대역폭의 병목 현상의 문제로 데이터 처리 속도의 제약이 …
[引用][C] Druglike: Applications of Proof-of-Optimization in Democratized Drug Discovery [Draft]
J Sommer - 2022
[引用][C] Druglike: Applications of Proof-of-Optimization in Democratized Drug Discovery
J Sommer - 2022