Smart Home Privacy Policies Demystified: A Study of Availability, Content, and CoverageSunil ManandharKaushal Kafleet al.2022USENIX Security 2022
Streamlining and Automating Threat Hunting With KestrelXiaokui ShuPaul Coccoliet al.2022Black Hat USA 2022
Quantum chemistry simulation of ground- and excited-state properties of the sulfonium cation on a superconducting quantum processorMario MottaGavin Joneset al.2022arXiv
Towards an Approximation-Aware Computational Workflow Framework for Accelerating Large-Scale Discovery TasksMichael A. JohnstonVassils Vassiliadis2022ApPLIED 2022
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge ProtocolsPankaj DayamaArpita Patraet al.2022PETS 2022
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association StudiesAnisa HalimiLeonard Dervishiet al.2022PETS 2022
Compressed-VFL: Communication-Efficient Learning with Vertically Partitioned DataTimothy CastigliaAnirban Daset al.2022ICML 2022
Federated Unlearning: How to Efficiently Erase a Client in FL?Anisa HalimiSwanand Ravindra Kadheet al.2022ICML 2022
JITServer: Disaggregated Caching JIT Compiler for the JVM in the CloudAlexey KhrabrovMarius Pirvuet al.2022USENIX ATC 2022
Demystifying Why Local Aggregation Helps: Convergence Analysis of Hierarchical SGDJiayi WangShiqiang Wanget al.2022AAAI 2022