Ehud Aharoni

Orcid: 0000-0002-3647-1440

According to our database1, Ehud Aharoni authored at least 26 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Power-Softmax: Towards Secure LLM Inference over Encrypted Data.
CoRR, 2024

2023
HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data.
Proc. Priv. Enhancing Technol., January, 2023

E2E near-standard and practical authenticated transciphering.
IACR Cryptol. ePrint Arch., 2023

Efficient Pruning for Machine Learning Under Homomorphic Encryption.
Proceedings of the Computer Security - ESORICS 2023, 2023

Generating One-Hot Maps Under Encryption.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Tutorial-HEPack4ML '23: Advanced HE Packing Methods with Applications to ML.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Complex Encoded Tile Tensors: Accelerating Encrypted Analytics.
IEEE Secur. Priv., 2022

HE-PEx: Efficient Machine Learning under Homomorphic Encryption using Pruning, Permutation and Expansion.
CoRR, 2022

Privacy-Preserving Record Linkage Using Local Sensitive Hash and Private Set Intersection.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2020
Tile Tensors: A versatile data structure with descriptive shapes for homomorphic encryption.
CoRR, 2020

A Cloud-Based Anomaly Detection for IoT Big Data.
Proceedings of the Cyber-Physical Security for Critical Infrastructures Protection, 2020

2017
Big data analysis of cloud storage logs using spark.
Proceedings of the 10th ACM International Systems and Storage Conference, 2017

Anomaly Detection in Large Databases Using Behavioral Patterning.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

2016
Identifying malicious activities from system execution traces.
IBM J. Res. Dev., 2016

On the Retrieval of Wikipedia Articles Containing Claims on Controversial Topics.
Proceedings of the 25th International Conference on World Wide Web, 2016

2015
Show Me Your Evidence - an Automatic Method for Context Dependent Evidence Detection.
Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015

2014
Claims on demand - an initial demonstration of a system for automatic detection and polarity identification of context dependent claims in massive corpora.
Proceedings of the COLING 2014, 2014

Context Dependent Claim Detection.
Proceedings of the COLING 2014, 2014

A Benchmark Dataset for Automatic Detection of Claims and Evidence in the Context of Controversial Topics.
Proceedings of the First Workshop on Argument Mining, 2014

2013
Hartigan's K-Means Versus Lloyd's K-Means - Is It Time for a Change?
Proceedings of the IJCAI 2013, 2013

2011
The Quality Preserving Database: A Computational Framework for Encouraging Collaboration, Enhancing Power and Controlling False Discovery.
IEEE ACM Trans. Comput. Biol. Bioinform., 2011

Smarter log analysis.
IBM J. Res. Dev., 2011

2009
HIV-1 Drug Resistance Prediction and Therapy Optimization: A Case Study for the Application of Classification and Clustering Methods.
Proceedings of the Similarity-Based Clustering, 2009

2008
Selecting anti-HIV therapies based on a variety of genomic and clinical factors.
Proceedings of the Proceedings 16th International Conference on Intelligent Systems for Molecular Biology (ISMB), 2008

1998
Restricted dynamic Steiner trees for scalable multicast in datagram networks.
IEEE/ACM Trans. Netw., 1998


  Loading...