Robert J. Walls

According to our database1, Robert J. Walls authored at least 38 papers between 2010 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Characterizing Concurrency Mechanisms for NVIDIA GPUs under Deep Learning Workloads (Extended Abstract).
SIGMETRICS Perform. Evaluation Rev., 2022

Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Characterizing concurrency mechanisms for NVIDIA GPUs under deep learning workloads.
Perform. Evaluation, 2021

Can the User Help? Leveraging User Actions for Network Profiling.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

Memory-Efficient Deep Learning Inference in Trusted Execution Environments.
Proceedings of the IEEE International Conference on Cloud Engineering, 2021

Data-Free Model Extraction.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Many Models at the Edge: Scaling Deep Inference via Model-Level Caching.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2021

2020
Demystifying the Placement Policies of the NVIDIA GPU Thread Block Scheduler for Concurrent Kernels.
SIGMETRICS Perform. Evaluation Rev., 2020

Silhouette: Efficient Protected Shadow Stacks for Embedded Systems.
Proceedings of the 29th USENIX Security Symposium, 2020

DRAB-LOCUS: An Area-Efficient AES Architecture for Hardware Accelerator Co-Location on FPGAs.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

Characterizing and Modeling Distributed Training with Transient Cloud GPU Servers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
Silhouette: Efficient Intra-Address Space Isolation for Protected Shadow Stacks on Embedded Systems.
CoRR, 2019

Confidential Deep Learning: Executing Proprietary Models on Untrusted Devices.
CoRR, 2019

A Random Number Generator Built from Repurposed Hardware in Embedded Systems.
CoRR, 2019

Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2019

Challenges and Opportunities of DNN Model Execution Caching.
Proceedings of the DIDL '19: Proceedings of the Workshop on Distributed Infrastructures for Deep Learning, 2019

Speeding up Deep Learning with Transient Servers.
Proceedings of the 2019 IEEE International Conference on Autonomic Computing, 2019

EdgeServe: efficient deep learning model caching at the edge.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

Control-Flow Integrity for Real-Time Embedded Systems.
Proceedings of the 31st Euromicro Conference on Real-Time Systems, 2019

2017
Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains.
IEEE Secur. Priv., 2017

A cyber-physical approach to trustworthy operation of health monitoring systems.
Proceedings of the 2017 IEEE SmartWorld, 2017

2016
Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

BinDNN: Resilient Function Matching Using Deep Learning.
Proceedings of the Security and Privacy in Communication Networks, 2016

Mapping sample scenarios to operational models.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Enforcing agile access control policies in relational databases using views.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Computational ontology of network operations.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Malware traffic detection using tamper resistant features.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Discovering specification violations in networked software systems.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

Measuring the Impact and Perception of Acceptable Advertisements.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

2014
Building an Ontology of Cyber Security.
Proceedings of the Ninth Conference on Semantic Technology for Intelligence, 2014

Efficient Smart Phone Forensics Based on Relevance Feedback.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014


2013
Measurement and analysis of child pornography trafficking on P2P networks.
Proceedings of the 22nd International World Wide Web Conference, 2013

2012
Functional Privacy or Why Cookies Are Better with Milk.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

2011
Liquid: A detection-resistant covert timing channel based on IPD shaping.
Comput. Networks, 2011

Effective Digital Forensics Research Is Investigator-Centric.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Forensic Triage for Mobile Phones with DEC0DE.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
Reverse engineering for mobile systems forensics with Ares.
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, 2010


  Loading...