Search Results - "Khin, Mi Mi Aung"
-
1
Multi-GPU Design and Performance Evaluation of Homomorphic Encryption on GPU Clusters
Published in IEEE transactions on parallel and distributed systems (01-02-2021)“…We present a multi-GPU design, implementation and performance evaluation of the Halevi-Polyakov-Shoup (HPS) variant of the Fan-Vercauteren (FV) levelled Fully…”
Get full text
Journal Article -
2
Achieving GWAS with homomorphic encryption
Published in BMC medical genomics (21-07-2020)“…One way of investigating how genes affect human traits would be with a genome-wide association study (GWAS). Genetic markers, known as single-nucleotide…”
Get full text
Journal Article -
3
The Initialization Factor: Understanding its Impact on Active Learning for Analog Circuit Design
Published in 2024 IEEE International Symposium on Circuits and Systems (ISCAS) (19-05-2024)“…Active learning, which aims to enhance modeling efficiency, precision, and cost effectiveness through selective labeling, is emerging as a promising strategy…”
Get full text
Conference Proceeding -
4
Scores Tell Everything about Bob: Non-adaptive Face Reconstruction on Face Recognition Systems
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19-05-2024)“…Face recognition systems (FRSs) typically store databases of discriminative real-valued template vectors, which are extracted from each enrolled user's facial…”
Get full text
Conference Proceeding -
5
Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields
Published in IEEE transactions on dependable and secure computing (01-11-2021)“…To achieve security and privacy for data stored on the cloud, we need the ability to secure data in compute. Equality comparisons, "<inline-formula><tex-math…”
Get full text
Journal Article -
6
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy
Published in IEEE transactions on dependable and secure computing (01-07-2022)“…With the explosive growth of user data, recommenders have become increasingly complicated. State-of-the-art algorithms often have high computational complexity…”
Get full text
Journal Article -
7
Threshold Homomorphic Encryption From Provably Secure NTRU
Published in Computer journal (14-12-2023)“…Abstract Homomorphic Encryption (HE) supports computation on encrypted data without the need to decrypt, enabling secure outsourcing of computing to an…”
Get full text
Journal Article -
8
SDN Controlled Local Re-routing to Reduce Congestion in Cloud Data Center
Published in 2015 International Conference on Cloud Computing Research and Innovation (ICCCRI) (01-10-2015)“…Data center networks require densely interconnected topologies to provide high bandwidth for various cloud computing services. It is required to fully utilize…”
Get full text
Conference Proceeding -
9
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme
Published in IEEE transactions on emerging topics in computing (01-04-2021)“…Homomorphic encryption is an emerging form of encryption that provides the ability to compute on encrypted data without ever decrypting them. Potential…”
Get full text
Journal Article -
10
DOReN: Toward Efficient Deep Convolutional Neural Networks with Fully Homomorphic Encryption
Published in IEEE transactions on information forensics and security (2021)“…Fully homomorphic encryption (FHE) is a powerful cryptographic primitive to secure outsourced computations against an untrusted third-party provider. With the…”
Get full text
Journal Article -
11
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing
Published in IEEE transactions on information forensics and security (2024)“…Multi-party computation (MPC) allows parties to interact with cloud-based data and services while maintaining privacy and confidentiality of their private…”
Get full text
Journal Article -
12
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs
Published in IEEE transactions on emerging topics in computing (01-07-2021)“…Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model…”
Get full text
Journal Article -
13
PrivFT: Private and Fast Text Classification With Homomorphic Encryption
Published in IEEE access (2020)“…We present an efficient and non-interactive method for Text Classification while preserving the privacy of the content using Fully Homomorphic Encryption…”
Get full text
Journal Article -
14
HEDup: Secure Deduplication with Homomorphic Encryption
Published in 2015 IEEE International Conference on Networking, Architecture and Storage (NAS) (01-08-2015)“…Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers (CSP)…”
Get full text
Conference Proceeding -
15
Faster Number Theoretic Transform on Graphics Processors for Ring Learning with Errors Based Cryptography
Published in 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI) (01-07-2018)“…The Number Theoretic Transform (NTT) has been revived recently by the advent of the Ring-Learning with Errors (Ring-LWE) Homomorphic Encryption (HE) schemes…”
Get full text
Conference Proceeding -
16
TOSS: Traffic-aware distributed object-based storage using software-defined networks
Published in 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI) (01-07-2018)“…As storage systems grow to Petascale, the demand for object storage increases. In a large scale heterogeneous object storage systems, efficient selection of…”
Get full text
Conference Proceeding -
17
CoVnita, an end-to-end privacy-preserving framework for SARS-CoV-2 classification
Published in Scientific reports (08-05-2023)“…Classification of viral strains is essential in monitoring and managing the COVID-19 pandemic, but patient privacy and data security concerns often limit the…”
Get full text
Journal Article -
18
Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments
Published in Algorithms (01-06-2022)“…The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality…”
Get full text
Journal Article -
19
High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA
Published in IACR transactions on cryptographic hardware and embedded systems (01-05-2018)“…Homomorphic encryption (HE) offers great capabilities that can solve a wide range of privacy-preserving computing problems. This tool allows anyone to process…”
Get full text
Journal Article -
20
Automatic framework to generate reconfigurable accelerators for option pricing applications
Published in 2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig) (01-11-2016)“…Option Pricing is a fundamental application in most financial institutions dealing with derivative market. It frequently requires huge computational effort and…”
Get full text
Conference Proceeding