Debayan Gupta

Orcid: 0000-0002-4457-1556

According to our database1, Debayan Gupta authored at least 24 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Fast and Secure Oblivious Stable Matching over Arithmetic Circuits.
IACR Cryptol. ePrint Arch., 2023

Developmental Pretraining (DPT) for Image Classification Networks.
CoRR, 2023

Tight Short-Lived Signatures.
CoRR, 2023

RANDGENER: Distributed Randomness Beacon from Verifiable Delay Function.
CoRR, 2023

Synthpop++: A Hybrid Framework for Generating A Country-scale Synthetic Population.
CoRR, 2023

SEM-CS: Semantic Clipstyler for Text-Based Image Style Transfer.
Proceedings of the IEEE International Conference on Image Processing, 2023

2022
India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities.
IACR Cryptol. ePrint Arch., 2022

Generating Synthetic Population.
CoRR, 2022

BEAS: Blockchain Enabled Asynchronous & Secure Federated Machine Learning.
CoRR, 2022

Scotch: An Efficient Secure Computation Framework for Secure Aggregation.
CoRR, 2022

ContextCLIP: Contextual Alignment of Image-Text pairs on CLIP visual representations.
Proceedings of the Thirteenth Indian Conference on Computer Vision, 2022

NEUROCRYPT: Coercion-Resistant Implicit Memory Authentication (Student Abstract).
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Flatee: Federated Learning Across Trusted Execution Environments.
CoRR, 2021

S++: A Fast and Deployable Secure-Computation Framework for Privacy-Preserving Neural Network Training.
CoRR, 2021

Differential Euler: Designing a Neural Network approximator to solve the Chaotic Three Body Problem.
CoRR, 2021

Poster: FLATEE: Federated Learning Across Trusted Execution Environments.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
An Alternative to India's Reservation Policy: A Unified Framework for Rigorous and Adaptive Measurement of Socio-Economic Status.
Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies, 2020

Trenchcoat: Human-Computable Hashing Algorithms for Password Generation.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2016
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation.
Proceedings of the Financial Cryptography and Data Security, 2016

Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2014
Systematizing Secure Computation for Research and Decision Support.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Practical and Privacy-Preserving Policy Compliance for Outsourced Data.
Proceedings of the Financial Cryptography and Data Security, 2014

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2012
A new approach to interdomain routing based on secure multi-party computation.
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012


  Loading...