Khin Mi Mi Aung

Orcid: 0000-0002-5652-3455

According to our database1, Khin Mi Mi Aung authored at least 87 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024

Unsupervised Fingerphoto Presentation Attack Detection With Diffusion Models.
CoRR, 2024

Scores Tell Everything about Bob: Non-adaptive Face Reconstruction on Face Recognition Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

The Initialization Factor: Understanding its Impact on Active Learning for Analog Circuit Design.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2024

2023
Threshold Homomorphic Encryption From Provably Secure NTRU.
Comput. J., December, 2023

Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption.
J. Inf. Secur. Appl., September, 2023

Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping.
Theor. Comput. Sci., August, 2023

Decentralized Identity Authentication with Auditability and Privacy.
Algorithms, January, 2023

Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments.
Proceedings of the Critical Infrastructure Protection XVII, 2023

2022
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy.
IEEE Trans. Dependable Secur. Comput., 2022

Skellam Mixture Mechanism: a Novel Approach to Federated Learning with Differential Privacy.
Proc. VLDB Endow., 2022

Field Instruction Multiple Data.
IACR Cryptol. ePrint Arch., 2022

Towards high performance homomorphic encryption for inference tasks on CPU: An MPI approach.
Future Gener. Comput. Syst., 2022

Non-Interactive Decision Trees and Applications with Multi-Bit TFHE.
Algorithms, 2022

Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments.
Algorithms, 2022

2021
Multi-GPU Design and Performance Evaluation of Homomorphic Encryption on GPU Clusters.
IEEE Trans. Parallel Distributed Syst., 2021

DOReN: Toward Efficient Deep Convolutional Neural Networks with Fully Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme.
IEEE Trans. Emerg. Top. Comput., 2021

Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs.
IEEE Trans. Emerg. Top. Comput., 2021

Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields.
IEEE Trans. Dependable Secur. Comput., 2021

Popcorn: Paillier Meets Compression For Efficient Oblivious Neural Network Inference.
CoRR, 2021

FFConv: Fast Factorized Neural Network Inference on Encrypted Data.
CoRR, 2021

Privacy-Preserving Collective Learning With Homomorphic Encryption.
IEEE Access, 2021

Genotype Imputation with Homomorphic Encryption.
Proceedings of the ICBIP 2021: 6th International Conference on Biomedical Signal and Image Processing, Suzhou, China, August 20, 2021

2020
Homomorphic Comparison for Point Numbers with User-Controllable Precision and Its Applications.
Symmetry, 2020

PrivFT: Private and Fast Text Classification With Homomorphic Encryption.
IEEE Access, 2020

Secure Transfer Learning for Machine Fault Diagnosis Under Different Operating Conditions.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

2019
Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem.
Theor. Comput. Sci., 2019

Achieving GWAS with Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2019

PrivFT: Private and Fast Text Classification with Homomorphic Encryption.
CoRR, 2019

CaRENets: Compact and Resource-Efficient CNN for Homomorphic Inference on Encrypted Medical Images.
CoRR, 2019

2018
High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Blockchain-based decentralized content trust for docker images.
Multim. Tools Appl., 2018

Dynamic scheduling strategy with efficient node availability prediction for handling divisible loads in multi-cloud systems.
J. Parallel Distributed Comput., 2018

Accelerating subset sum and lattice based public-key cryptosystems with multi-core CPUs and GPUs.
J. Parallel Distributed Comput., 2018

The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs.
IACR Cryptol. ePrint Arch., 2018

TOSS: Traffic-aware distributed object-based storage using software-defined networks.
Proceedings of the 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singpapore, Singapore, July 31, 2018

Faster Number Theoretic Transform on Graphics Processors for Ring Learning with Errors Based Cryptography.
Proceedings of the 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singpapore, Singapore, July 31, 2018

2017
Decentralized Content Trust for Docker Images.
Proceedings of the 2nd International Conference on Internet of Things, 2017

2016
Building a large-scale object-based active storage platform for data analytics in the internet of things.
J. Supercomput., 2016

Leakage aware resource management approach with machine learning optimization framework for partially reconfigurable architectures.
Microprocess. Microsystems, 2016

Secure Object Stores (SOS): Non-Volatile Memory Architecture for Secure Computing.
J. Comput., 2016

Secured Large Scale Shared Storage System.
J. Commun., 2016

Secure searching on cloud storage enhanced by homomorphic indexing.
Future Gener. Comput. Syst., 2016

Machine Learning Approach to Generate Pareto Front for List-scheduling Algorithms.
Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems, 2016

Automatic framework to generate reconfigurable accelerators for option pricing applications.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2016

A study of secure DBaaS with encrypted data transactions.
Proceedings of the 2nd International Conference on Communication and Information Processing, 2016

Software-defined load balancer in cloud data centers.
Proceedings of the 2nd International Conference on Communication and Information Processing, 2016

Privacy-Preserved Multi-Party Data Merging with Secure Equality Evaluation.
Proceedings of the International Conference on Cloud Computing Research and Innovations, 2016

Towards Secure and Fast Mapping of Genomic Sequences on Public Clouds.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

A Security-Aware Data Placement Mechanism for Big Data Cloud Storage Systems.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
SELDAC: Software-Defined Storage based Efficient Load Distribution and Auto Scaling in Cloud Data Centers.
J. Commun., 2015

HEDup: Secure Deduplication with Homomorphic Encryption.
Proceedings of the 10th IEEE International Conference on Networking, 2015

Building a Robust and Efficient Middleware for Geo-replicated Storage Systems.
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015

SDN Controlled Local Re-routing to Reduce Congestion in Cloud Data Center.
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015

StealthyCRM: A Secure Cloud CRM System Application that Supports Fully Homomorphic Database Encryption.
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015

Flexible Yet Secure De-duplication Service for Enterprise Data on Cloud Storage.
Proceedings of the 2015 International Conference on Cloud Computing Research and Innovation, 2015

Exploiting loop-array dependencies to accelerate the design space exploration with high level synthesis.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

2014
A layer 2 multipath solution and its performance evaluation for Data Center Ethernets.
Int. J. Commun. Syst., 2014

Virtual machine placement with two-path traffic routing for reduced congestion in data center networks.
Comput. Commun., 2014

Scheduling Multiple Divisible Loads in a Multi-cloud System.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Design Space Exploration to Accelerate Nelder-Mead Algorithm Using FPGA.
Proceedings of the 22nd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2014

Homomorphic Exclusive-Or Operation Enhance Secure Searching on Cloud Storage.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

An efficient scheme to ensure data availability for a cloud service provider.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

ESPRESSO: An Encryption as a Service for Cloud Storage Systems.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
Power-Efficient Virtual Machine Placement and Migration in Data Centers.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

sAES: A high throughput and low latency secure cloud storage with pipelined DMA based PCIe interface.
Proceedings of the 2013 International Conference on Field-Programmable Technology, 2013

Incorporating Energy and Throughput Awareness in Design Space Exploration and Run-Time Mapping for Heterogeneous MPSoCs.
Proceedings of the 2013 Euromicro Conference on Digital System Design, 2013

An efficient flow cache algorithm with improved fairness in Software-Defined Data Center Networks.
Proceedings of the IEEE 2nd International Conference on Cloud Networking, 2013

2012
OpenFlow based control for re-routing with differentiated flows in Data Center Networks.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Prompt congestion reaction scheme for data center network using multiple congestion points.
Proceedings of IEEE International Conference on Communications, 2012

Energy optimizations for data center network: Formulation and its solution.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Differentiated Congestion Management of Data Traffic for Data Center Ethernet.
IEEE Trans. Netw. Serv. Manag., 2011

2010
Dynamic Load Balancing Multipathing in Data Center Ethernet.
Proceedings of the MASCOTS 2010, 2010

Differentiated Ethernet Congestion Management for Prioritized Traffic.
Proceedings of IEEE International Conference on Communications, 2010

A Privacy Enhanced Data Aggregation Model.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Secured Key Distribution Scheme for Cryptographic Key Management System.
Proceedings of the ARES 2010, 2010

2006
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration.
Int. J. Netw. Secur., 2006

Survival of the Internet Applications: A Cluster Recovery Model.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
A Model of ITS Using Cold Standby Cluster.
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005

A Survivability Model for Cluster System.
Proceedings of the Distributed and Parallel Computing, 2005

A Survivability Model for Cluster System Under DoS Attacks.
Proceedings of the High Performance Computing and Communications, 2005

A rejuvenation methodology of cluster recovery.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
Software Rejuvenation Approach to Security Engineering.
Proceedings of the Computational Science and Its Applications, 2004

The optimum time to perform software rejuvenation for survivability.
Proceedings of the IASTED International Conference on Software Engineering, 2004

Transient Time Analysis of Network Security Survivability Using DEVS.
Proceedings of the Artificial Intelligence and Simulation, 2004

A Framework of Software Rejuvenation for Survivability.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004


  Loading...