Follow
Aastha Mehta
Title
Cited by
Cited by
Year
Oblivious {Multi-Party} machine learning on trusted processors
O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ...
25th USENIX Security Symposium (USENIX Security 16), 619-636, 2016
6652016
Privacy-preserving machine learning
MSDS Costa, CAMC Fournet, A Mehta, S Nowozin, O Ohrimenko, ...
US Patent App. 15/245,141, 2017
532017
Qapla: Policy compliance for database-backed systems
A Mehta, E Elnikety, K Harvey, D Garg, P Druschel
26th USENIX Security Symposium (USENIX Security 17), 1463-1479, 2017
522017
Thoth: Comprehensive policy compliance in data retrieval systems
E Elnikety, A Mehta, A Vahldiek-Oberwagner, D Garg, P Druschel
25th USENIX Security Symposium (USENIX Security 16), 637-654, 2016
452016
Guardat: Enforcing data policies at the storage layer
A Vahldiek-Oberwagner, E Elnikety, A Mehta, D Garg, P Druschel, ...
Proceedings of the Tenth European Conference on Computer Systems, 1-16, 2015
442015
Listening to Bluetooth beacons for epidemic risk mitigation
G Barthe, RD Viti, P Druschel, D Garg, M Gomez-Rodriguez, P Ingo, ...
Scientific Reports 12 (1), 5558, 2022
142022
Pacer: Comprehensive Network {Side-Channel} Mitigation in the Cloud
A Mehta, M Alzayat, R De Viti, BB Brandenburg, P Druschel, D Garg
31st USENIX Security Symposium (USENIX Security 22), 2819-2838, 2022
11*2022
SGX-enabled oblivious machine learning
O Ohrimenko, M Costa, C Fournet, S Nowozin, A Mehta, F Schuster, ...
72016
PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation
G Barthe, RD Viti, P Druschel, D Garg, M Gomez-Rodriguez, P Ingo, ...
52020
Guardat: A foundation for policy-protected data
A Vahldiek, E Elnikety, A Mehta, D Garg, P Druschel, A Post, R Rodrigues, ...
MPI-SWS, Tech. Rep, 014-002, 2014
42014
{NetShaper}: A Differentially Private Network {Side-Channel} Mitigation System
A Sabzi, R Vora, S Goswami, M Seltzer, M Lécuyer, A Mehta
33rd USENIX Security Symposium (USENIX Security 24), 3385-3402, 2024
12024
LDPKiT: Recovering Utility in LDP Schemes by Training with Noise^ 2
K Li, Y Xi, A Mehta, D Lie
arXiv preprint arXiv:2405.16361, 2024
2024
Stream Processing with Adaptive Edge-Enhanced Confidential Computing
Y Yan, P Mishra, W Huang, A Mehta, O Balmau, D Lie
Proceedings of the 7th International Workshop on Edge Systems, Analytics and …, 2024
2024
ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic
G Mitra, P Dash, YE Yao, A Mehta, K Pattabiraman
arXiv preprint arXiv:2312.06140, 2023
2023
Reconciling Security and Utility in Next-Generation Epidemic Risk Mitigation Systems
P Ingo, N Boufford, MC Jiang, R Lindsay, R De Viti, M Lentz, G Barthe, ...
arXiv preprint arXiv:2011.08069, 2020
2020
Ensuring compliance with data privacy and usage policies in online services
A Mehta
Saarländische Universitäts-und Landesbibliothek, 2020
2020
T3: Comprehensive policy compliance in data retrieval systems
E Elnikety, A Mehta, A Vahldiek-Oberwanger, D Garg, P Druschel
2016
Guardat: A foundation for policy-protected persistent data
A Vahldiek, E Elnikety, A Mehta, D Garg, P Druschel, J Gehrke, ...
The system can't perform the operation now. Try again later.
Articles 1–18