Mohit Tiwari
Orcid: 0000-0003-1836-3451
According to our database1,
Mohit Tiwari
authored at least 86 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security.
J. High Speed Networks, 2024
Obsidian: Cooperative State-Space Exploration for Performant Inference on Secure ML Accelerators.
CoRR, 2024
Proceedings of the International Symposium on Secure and Private Execution Environment Design, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, 2024
2023
Greybox Penetration Testing on Cloud Access Control with IAM Modeling and Deep Reinforcement Learning.
CoRR, 2023
Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Methodologies and Challenges of Cybersecurity Techniques in Cloud Computing Environment.
Proceedings of the 5th International Conference on Information Management & Machine Intelligence, 2023
Proceedings of the 5th International Conference on Information Management & Machine Intelligence, 2023
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023
Application of Soft Computing Techniques for Predictive Analytics in Financial Markets.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023
Cognitive Defense Cyber Attack Prediction and Security Design in Machine Learning Model.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023
Design and Implementation of Block Chain with Cybersecurity Scheme for Fog Based Internet of Things.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023
The Empirical Analysis of Machine Learning-Based Techniques for Improving Cyber Security.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023
2022
LCIPA: Lightweight clustering protocol for industry 4.0 enabled precision agriculture.
Microprocess. Microsystems, October, 2022
ACM J. Emerg. Technol. Comput. Syst., 2022
IEEE Comput. Archit. Lett., 2022
Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Proceedings of the 5th International Conference on Contemporary Computing and Informatics, 2022
A Framework of Artificial Intelligence for the Manufacturing and Image Classification system.
Proceedings of the 5th International Conference on Contemporary Computing and Informatics, 2022
Proceedings of the 5th International Conference on Contemporary Computing and Informatics, 2022
Analysis of blockchain technology based on digital management systems and data mining technology.
Proceedings of the 5th International Conference on Contemporary Computing and Informatics, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols.
ACM Trans. Embed. Comput. Syst., 2021
Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses.
ACM J. Emerg. Technol. Comput. Syst., 2021
An image quality enhancement scheme employing adolescent identity search algorithm in the NSST domain for multimodal medical image fusion.
Biomed. Signal Process. Control., 2021
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware.
Proceedings of the IEEE Hot Chips 33 Symposium, 2021
Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021
2020
SESAME: Software defined Enclaves to Secure Inference Accelerators with Multi-tenant Execution.
CoRR, 2020
2019
Cyclone: Detecting Contention-Based Cache Information Leaks Through Cyclic Interference.
Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture, 2019
Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019
Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019
2018
Proc. Priv. Enhancing Technol., 2018
The Shape of Alerts: Detecting Malware Using Distributed Detectors by Robustly Amplifying Transient Correlations.
CoRR, 2018
Proceedings of the International Conference on Computer-Aided Design, 2018
Proceedings of the IEEE International Symposium on High Performance Computer Architecture, 2018
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018
2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 49th Annual IEEE/ACM International Symposium on Microarchitecture, 2016
Invited - Who is the major threat to tomorrow's security?: you, the hardware designer.
Proceedings of the 53rd Annual Design Automation Conference, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 48th International Symposium on Microarchitecture, 2015
Proceedings of the 21st IEEE International Symposium on High Performance Computer Architecture, 2015
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
2014
ACM Trans. Design Autom. Electr. Syst., 2014
Proceedings of the HASP 2014, 2014
Memory bandwidth reservation in the cloud to avoid information leakage in the memory controller.
Proceedings of the HASP 2014, 2014
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014
2013
Proceedings of the 2013 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
Dataflow Tomography: Information Flow Tracking For Understanding and Visualizing Full Systems.
ACM Trans. Archit. Code Optim., 2012
Opportunities and Challenges of Using Plasmonic Components in Nanophotonic Architectures.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2012
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012
2011
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2011
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security.
Proceedings of the 38th International Symposium on Computer Architecture (ISCA 2011), 2011
Fighting fire with fire: modeling the datacenter-scale effects of targeted superlattice thermal management.
Proceedings of the 38th International Symposium on Computer Architecture (ISCA 2011), 2011
Proceedings of the 48th Design Automation Conference, 2011
2010
Secure information flow analysis for hardware design: using the right abstraction for the job.
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, 2010
Proceedings of the 47th Design Automation Conference, 2010
Proceedings of the 5th Workshop on Embedded Systems Security, 2010
Proceedings of the 21st IEEE International Conference on Application-specific Systems Architectures and Processors, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Execution leases: a hardware-supported mechanism for enforcing strong non-interference.
Proceedings of the 42st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-42 2009), 2009
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009
Proceedings of the PACT 2009, 2009
2008
A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags.
Proceedings of the 41st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-41 2008), 2008