Biblio

Export 12686 results:
2024
Xu M, Cai D, Wu Y, Li X, Wang S.  2024.  FwdLLM: Efficient Federated Finetuning of Large Language Models with Perturbed Inferences. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :579--596.
Sivaraman V, Karimi P, Venkatapathy V, Khani M, Fouladi S, Alizadeh M, Durand F, Sze V.  2024.  Gemino: Practical and Robust Neural Compression for Video Conferencing. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :569--590.
Hoang NPhong, Dalek J, Crete-Nishihata M, Christin N, Yegneswaran V, Polychronakis M, Feamster N.  2024.  GFWeb: Measuring the Great Firewall's Web Censorship at Scale. 33rd USENIX Security Symposium (USENIX Security 24). :2617--2633.
Ragab H, Mambretti A, Kurmus A, Giuffrida C.  2024.  GhostRace: Exploiting and Mitigating Speculative Race Conditions. 33rd USENIX Security Symposium (USENIX Security 24). :6185--6202.
Cornelissen E, Shcherbakov M, Balliu M.  2024.  GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes. 33rd USENIX Security Symposium (USENIX Security 24). :3693--3710.
Busch M, Mao P, Payer M.  2024.  GlobalConfusion: TrustZone Trusted Application 0-Days by Design. 33rd USENIX Security Symposium (USENIX Security 24). :5537--5554.
Tobah Y, Kwong A, Kang I, Genkin D, Shin KG.  2024.  Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage. 33rd USENIX Security Symposium (USENIX Security 24). :1635--1650.
Chen B, Wang Y, Shome P, Fletcher C, Kohlbrenner D, Paccagnella R, Genkin D.  2024.  GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers. 33rd USENIX Security Symposium (USENIX Security 24). :1117--1134.
Guo Y, Zhang Z, Yang J.  2024.  GPU Memory Exploitation for Fun and Profit. 33rd USENIX Security Symposium (USENIX Security 24). :4033--4050.
Cheng Y, Zhang Z, Li H, Arapin A, Zhang Y, Zhang Q, Liu Y, Du K, Zhang X, Yan FY et al..  2024.  GRACE: Loss-Resilient Real-Time Video through Neural Codecs. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :509--531.
Thudi A, Jia H, Meehan C, Shumailov I, Papernot N.  2024.  Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD. 33rd USENIX Security Symposium (USENIX Security 24). :973--990.
Wang S, Zheng Y, Jia X.  2024.  GraphGuard: Private Time-Constrained Pattern Detection Over Streaming Graphs in the Cloud. 33rd USENIX Security Symposium (USENIX Security 24). :3495--3512.
Guo R, Li J, Yu S.  2024.  GridSE: Towards Practical Secure Geographic Search via Prefix Symmetric Searchable Encryption. 33rd USENIX Security Symposium (USENIX Security 24). :5413--5430.
Sokoto S, Balduf L, Trautwein D, Wei Y, Tyson G, Castro I, Ascigil O, Pavlou G, Korczynski M, Scheuermann B et al..  2024.  Guardians of the Galaxy: Content Moderation in the InterPlanetary File System. 33rd USENIX Security Symposium (USENIX Security 24). :1507--1524.
De Silva R, Guo W, Ruaro N, Grishchenko I, Kruegel C, Vigna G.  2024.  GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning. 33rd USENIX Security Symposium (USENIX Security 24). :3549--3566.
Gu Y, Wang Y, Sun Y, Xiang Y, Hu X, Qi Z, Guan H.  2024.  gVulkan: Scalable GPU Pooling for Pixel-Grained Rendering in Ray Tracing. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :1151--1165.
Zhang A, Wang C, Hu Y, Hassan A, Zhang Z, Han B, Qian F, Xu S.  2024.  Habitus: Boosting Mobile Immersive Content Delivery through Full-body Pose Tracking and Multipath Networking. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1677--1695.
Meng Z, Kong X, Chen J, Wang B, Xu M, Han R, Liu H, Arun V, Hu H, Wei X.  2024.  Hairpin: Rethinking Packet Loss Recovery in Edge-based Interactive Video Streaming. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :907--926.
Lou J, Kong X, Huang J, Bai W, Kim NSung, Zhuo D.  2024.  Harmonic: Hardware-assisted RDMA Performance Isolation for Public Clouds. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1479--1496.
[Anonymous].  2024.  Harmonizing Efficiency and Practicability: Optimizing Resource Utilization in Serverless Computing with ASTROLABE. 2024 USENIX Annual Technical Conference (USENIX ATC 24).
Liu Q, Yang Y, Du D, Xia Y, Zhang P, Feng J, Larus JR, Chen H.  2024.  Harmonizing Efficiency and Practicability: Optimizing Resource Utilization in Serverless Computing with Jiagu. 2024 USENIX Annual Technical Conference (USENIX ATC 24). :1--17.
Agarwal S, Cai Q, Agarwal R, Shmoys D, Vahdat A.  2024.  Harmony: A Congestion-free Datacenter Architecture. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :329--343.
Qiao Y, Ruan Z, Ma H, Belay A, Kim M, Xu H.  2024.  Harvesting Idle Memory for Application-managed Soft State with Midas. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1247--1265.
Luo Z, Son S, Ratnasamy S, Shenker S.  2024.  Harvesting Memory-bound CPU Stall Cycles in Software with MSH. 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI 24). :57--75.
Schlüter B, Sridhara S, Kuhne M, Bertschi A, Shinde S.  2024.  HECKLER: Breaking Confidential VMs with Malicious Interrupts. 33rd USENIX Security Symposium (USENIX Security 24). :3459--3476.

Pages