Skip to content

Publications

1997 entries « 1 of 200 »
1.

Adeel Aslam, Kaustubh Beedkar, Giovanni Simonini

SPO-Join: Efficient Stream Inequality Join Proceedings Article

In: Alkis Simitsis, Bettina Kemme, Anna Queralt, Oscar Romero, Petar Jovanovic (Ed.): Proceedings 28th International Conference on Extending Database Technology, EDBT 2025, Barcelona, Spain, March 25-28, 2025, pp. 145–157, OpenProceedings.org, 2025.

Links | BibTeX

2.

Shivam Bansal, Keerti Choudhary, Harkirat Dhanoa, Harsh Wardhan

Fault-Tolerant Bounded Flow Preservers Proceedings Article

In: Julián Mestre, Anthony Wirth (Ed.): 35th International Symposium on Algorithms and Computation, ISAAC 2024, December 8-11, 2024, Sydney, Australia, pp. 9:1–9:14, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2024.

Links | BibTeX

3.

Davide Bilò, Shiri Chechik, Keerti Choudhary, Sarel Cohen, Tobias Friedrich, Martin Schirneck

Improved Distance (Sensitivity) Oracles with Subquadratic Space Proceedings Article

In: 65th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2024, Chicago, IL, USA, October 27-30, 2024, pp. 1550–1558, IEEE, 2024.

Links | BibTeX

4.

Abhilash Jindal, Kaustubh Beedkar, Vishal Singh, J. Nausheen Mohammed, Tushar Singla, Aman Gupta, Keerti Choudhary

Reactive Dataflow for Inflight Error Handling in ML Workflows Proceedings Article

In: Proceedings of the Eighth Workshop on Data Management for End-to-End Machine Learning, DEEM 2024, Santiago, AA, Chile, 9 June 2024, pp. 51–61, ACM, 2024.

Links | BibTeX

5.

Davide Bilò, Shiri Chechik, Keerti Choudhary, Sarel Cohen, Tobias Friedrich, Simon Krogmann, Martin Schirneck

Approximate Distance Sensitivity Oracles in Subquadratic Space Journal Article

In: TheoretiCS, vol. 3, 2024.

Links | BibTeX

6.

Sanchit Gupta, Vireshwar Kumar

REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training Proceedings Article

In: Vishwas T. Patil, Ram Krishnan, Rudrapatna K. Shyamasundar (Ed.): Information Systems Security - 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024, Proceedings, pp. 246–264, Springer, 2024.

Links | BibTeX

7.

Subrat Kumar Swain, Vireshwar Kumar, Guangdong Bai, Dan Dongseong Kim

PANDA: Practical Adversarial Attack Against Network Intrusion Detection Proceedings Article

In: 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024 - Supplemental Volume, Brisbane, Australia, June 24-27, 2024, pp. 28–32, IEEE, 2024.

Links | BibTeX

8.

Mehreen Jabbeen, Vireshwar Kumar, Rijurekha Sen

SpotOn: Adversarially Robust Keyword Spotting on Resource-Constrained IoT Platforms Proceedings Article

In: Jianying Zhou, Tony Q. S. Quek, Debin Gao, Alvaro A. Cárdenas (Ed.): Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2024, Singapore, July 1-5, 2024, ACM, 2024.

Links | BibTeX

9.

Vamshi Sunku Mohan, Sriram Sankaran, Vireshwar Kumar, Krishnashree Achuthan

EP-CuMAC: Energy and performance-efficient integrity protection for narrow-band IoT Journal Article

In: Internet Things, vol. 25, pp. 101004, 2024.

Links | BibTeX

10.

Abhishek Rose, Sorav Bansal

Modeling Dynamic (De)Allocations of Local Memory for Translation Validation Journal Article

In: Proc. ACM Program. Lang., vol. 8, no. OOPSLA1, pp. 1463–1492, 2024.

Links | BibTeX

1997 entries « 1 of 200 »