Search Results - "Aung, Khin Mi Mi"

Refine Results
  1. 1

    Multi-GPU Design and Performance Evaluation of Homomorphic Encryption on GPU Clusters by Al Badawi, Ahmad, Veeravalli, Bharadwaj, Lin, Jie, Xiao, Nan, Kazuaki, Matsumura, Khin Mi Mi, Aung

    “…We present a multi-GPU design, implementation and performance evaluation of the Halevi-Polyakov-Shoup (HPS) variant of the Fan-Vercauteren (FV) levelled Fully…”
    Get full text
    Journal Article
  2. 2

    Achieving GWAS with homomorphic encryption by Sim, Jun Jie, Chan, Fook Mun, Chen, Shibin, Meng Tan, Benjamin Hong, Mi Aung, Khin Mi

    Published in BMC medical genomics (21-07-2020)
    “…One way of investigating how genes affect human traits would be with a genome-wide association study (GWAS). Genetic markers, known as single-nucleotide…”
    Get full text
    Journal Article
  3. 3

    The Initialization Factor: Understanding its Impact on Active Learning for Analog Circuit Design by Ata, Sezin Kircali, Kong, Zhi Hui, James, Anusha, Cai, Lile, Yeo, Kiat Seng, Mi Mi Aung, Khin, Foo, Chuan Sheng, James, Ashish

    “…Active learning, which aims to enhance modeling efficiency, precision, and cost effectiveness through selective labeling, is emerging as a promising strategy…”
    Get full text
    Conference Proceeding
  4. 4

    Scores Tell Everything about Bob: Non-adaptive Face Reconstruction on Face Recognition Systems by Kim, Sunpill, Tan, Yong Kiam, Jeong, Bora, Mondal, Soumik, Mi Aung, Khin Mi, Hong Seo, Jae

    “…Face recognition systems (FRSs) typically store databases of discriminative real-valued template vectors, which are extracted from each enrolled user's facial…”
    Get full text
    Conference Proceeding
  5. 5

    Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields by Tan, Benjamin Hong Meng, Lee, Hyung Tae, Wang, Huaxiong, Ren, Shuqin, Aung, Khin Mi Mi

    “…To achieve security and privacy for data stored on the cloud, we need the ability to secure data in compute. Equality comparisons, "<inline-formula><tex-math…”
    Get full text
    Journal Article
  6. 6

    CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy by Wang, Jun, Jin, Chao, Tang, Qiang, Liu, Zhe, Aung, Khin Mi Mi

    “…With the explosive growth of user data, recommenders have become increasingly complicated. State-of-the-art algorithms often have high computational complexity…”
    Get full text
    Journal Article
  7. 7

    Threshold Homomorphic Encryption From Provably Secure NTRU by Xu, Kexin, Hong Meng Tan, Benjamin, Wang, Li-Ping, Mi Mi Aung, Khin, Wang, Huaxiong

    Published in Computer journal (14-12-2023)
    “…Abstract Homomorphic Encryption (HE) supports computation on encrypted data without the need to decrypt, enabling secure outsourcing of computing to an…”
    Get full text
    Journal Article
  8. 8

    SDN Controlled Local Re-routing to Reduce Congestion in Cloud Data Center by Kanagevlu, Renuga, Mi Aung, Khin Mi

    “…Data center networks require densely interconnected topologies to provide high bandwidth for various cloud computing services. It is required to fully utilize…”
    Get full text
    Conference Proceeding
  9. 9

    Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme by Al Badawi, Ahmad, Polyakov, Yuriy, Aung, Khin Mi Mi, Veeravalli, Bharadwaj, Rohloff, Kurt

    “…Homomorphic encryption is an emerging form of encryption that provides the ability to compute on encrypted data without ever decrypting them. Potential…”
    Get full text
    Journal Article
  10. 10

    DOReN: Toward Efficient Deep Convolutional Neural Networks with Fully Homomorphic Encryption by Meftah, Souhail, Tan, Benjamin Hong Meng, Mun, Chan Fook, Aung, Khin Mi Mi, Veeravalli, Bharadwaj, Chandrasekhar, Vijay

    “…Fully homomorphic encryption (FHE) is a powerful cryptographic primitive to secure outsourced computations against an untrusted third-party provider. With the…”
    Get full text
    Journal Article
  11. 11

    Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing by Hu, Jingwei, Zhao, Yongjun, Hong Meng Tan, Benjamin, Aung, Khin Mi Mi, Wang, Huaxiong

    “…Multi-party computation (MPC) allows parties to interact with cloud-based data and services while maintaining privacy and confidentiality of their private…”
    Get full text
    Journal Article
  12. 12

    Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs by Al Badawi, Ahmad, Jin, Chao, Lin, Jie, Mun, Chan Fook, Jie, Sim Jun, Tan, Benjamin Hong Meng, Nan, Xiao, Aung, Khin Mi Mi, Chandrasekhar, Vijay Ramaseshan

    “…Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model…”
    Get full text
    Journal Article
  13. 13

    PrivFT: Private and Fast Text Classification With Homomorphic Encryption by Badawi, Ahmad Al, Hoang, Louie, Mun, Chan Fook, Laine, Kim, Aung, Khin Mi Mi

    Published in IEEE access (2020)
    “…We present an efficient and non-interactive method for Text Classification while preserving the privacy of the content using Fully Homomorphic Encryption…”
    Get full text
    Journal Article
  14. 14

    HEDup: Secure Deduplication with Homomorphic Encryption by Miguel, Rodel, Khin Mi Mi Aung, Mediana

    “…Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers (CSP)…”
    Get full text
    Conference Proceeding
  15. 15

    Faster Number Theoretic Transform on Graphics Processors for Ring Learning with Errors Based Cryptography by Badawi, Ahmad Al, Veeravalli, Bharadwaj, Mi Aung, Khin Mi

    “…The Number Theoretic Transform (NTT) has been revived recently by the advent of the Ring-Learning with Errors (Ring-LWE) Homomorphic Encryption (HE) schemes…”
    Get full text
    Conference Proceeding
  16. 16

    TOSS: Traffic-aware distributed object-based storage using software-defined networks by Kanagavelu, Renuga, Yongqing, Zhu, Mi Aung, Khin Mi

    “…As storage systems grow to Petascale, the demand for object storage increases. In a large scale heterogeneous object storage systems, efficient selection of…”
    Get full text
    Conference Proceeding
  17. 17

    CoVnita, an end-to-end privacy-preserving framework for SARS-CoV-2 classification by Sim, Jun Jie, Zhou, Weizhuang, Chan, Fook Mun, Annamalai, Meenatchi Sundaram Muthu Selva, Deng, Xiaoxia, Tan, Benjamin Hong Meng, Aung, Khin Mi Mi

    Published in Scientific reports (08-05-2023)
    “…Classification of viral strains is essential in monitoring and managing the COVID-19 pandemic, but patient privacy and data security concerns often limit the…”
    Get full text
    Journal Article
  18. 18

    Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments by Meftah, Souhail, Zhang, Shuhao, Veeravalli, Bharadwaj, Aung, Khin Mi Mi

    Published in Algorithms (01-06-2022)
    “…The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality…”
    Get full text
    Journal Article
  19. 19

    High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA by Ahmad Al Badawi, Bharadwaj Veeravalli, Chan Fook Mun, Khin Mi Mi Aung

    “…Homomorphic encryption (HE) offers great capabilities that can solve a wide range of privacy-preserving computing problems. This tool allows anyone to process…”
    Get full text
    Journal Article
  20. 20

    Automatic framework to generate reconfigurable accelerators for option pricing applications by Pham, Nam Khanh, Mi Aung, Khin Mi, Kumar, Akash

    “…Option Pricing is a fundamental application in most financial institutions dealing with derivative market. It frequently requires huge computational effort and…”
    Get full text
    Conference Proceeding