Anwar Hithnawi

Orcid: 0009-0000-5603-1031

According to our database1, Anwar Hithnawi authored at least 37 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fragile Giants: Understanding the Susceptibility of Models to Subpopulation Attacks.
CoRR, 2024

UTrace: Poisoning Forensics for Private Collaborative Learning.
CoRR, 2024

Artemis: Efficient Commit-and-Prove SNARKs for zkML.
CoRR, 2024

vFHE: Verifiable Fully Homomorphic Encryption.
Proceedings of the 12th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2024

Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024

Cohere: Managing Differential Privacy in Large Scale Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Cohere: Privacy Management in Large Scale Systems.
CoRR, 2023

Verifiable Fully Homomorphic Encryption.
CoRR, 2023

HECO: Fully Homomorphic Encryption Compiler.
Proceedings of the 32nd USENIX Security Symposium, 2023

RoFL: Robustness of Secure Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
CoVault: A Secure Analytics Platform.
CoRR, 2022

HECO: Automatic Code Optimizations for Efficient Fully Homomorphic Encryption.
CoRR, 2022

VF-PS: How to Select Important Participants in Vertical Federated Learning, Efficiently and Securely?
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

2021
RoFL: Attestable Robustness for Secure Federated Learning.
CoRR, 2021

SoK: Fully Homomorphic Encryption Compilers.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Zeph: Cryptographic Enforcement of End-to-End Data Privacy.
Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation, 2021

2020
Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams.
Proceedings of the 29th USENIX Security Symposium, 2020

TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

2018
TimeCrypt: A Scalable Private Time Series Data Store.
CoRR, 2018

Droplet: Decentralized Authorization for IoT Data Streams.
CoRR, 2018

2017
Towards Blockchain-based Auditable Storage and Sharing of IoT Data.
CoRR, 2017

Privacy-preserving Quantified Self: Secure Sharing and Processing of Encrypted Small Data.
Proceedings of the Workshop on Mobility in the Evolving Internet Architecture, 2017

Secure Sharing of Partially Homomorphic Encrypted IoT Data.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Towards Blockchain-based Auditable Storage and Sharing of IoT Data.
Proceedings of the 9th Cloud Computing Security Workshop, 2017

2016
Talos a Platform for Processing Encrypted IoT Data: Demo Abstract.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

CrossZig: Combating Cross-Technology Interference in Low-Power Wireless Networks.
Proceedings of the 15th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2016

2015
Talos: Encrypted Query Processing for the Internet of Things.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Poster: Cross-Layer Optimization for Low-power Wireless Coexistence.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Poster: Towards Encrypted Query Processing for the Internet of Things.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Controlled Interference Generation for Wireless Coexistence Research.
Proceedings of the 2015 Workshop on Software Radio Implementation Forum, 2015

TIIM: technology-independent interference mitigation for low-power wireless networks.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

2014
Poster: come closer: proximity-based authentication for the internet of things.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Understanding the impact of cross technology interference on IEEE 802.15.4.
Proceedings of the 9th ACM international workshop on Wireless network testbeds, 2014

Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

Poster Abstract: Low-Power Wireless Channel Quality Estimation in the Presence of RF Smog.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

2013
Exploiting physical layer information to mitigate cross-technology interference effects on low-power wireless networks.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

2012
A receiver-based 802.11 rate adaptation scheme with On-Demand Feedback.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012


  Loading...