• Achieving Fairness in the Stochastic Multi-Armed Bandit Problem 

      Patil, Vishakha
      The classical Stochastic Multi-armed Bandit (MAB) problem provides an abstraction for many real-world decision making problems such as sponsored-search auctions, crowd-sourcing, wireless communication, etc. In this work, ...
    • Efficient and Secure Search over Encrypted Data 

      Shah, Akash
      Due to a variety of crucial bene fits, enterprises outsource their data to cloud resident storage. The outsourced data needs to be stored in encrypted form on remote untrusted servers to preserve privacy. However, if the ...
    • Equivalence test for the trace iterated matrix multiplication polynomial 

      Murthy, Janaky
      An m-variate polynomial f is affine equivalent to an n-variate polynomial g if m > n and there is a full rank n * m matrix A and a n-dimensional vector b such that f(x) = g(Ax + b). Given blackbox access to f and g (i.e ...
    • Experiences in using Reinforcement Learning for Directed Fuzzing 

      Malakar, Subhendu
      Directed testing is a technique to analyze user-specified target locations in the program. It reduces the time and effort of developers by excluding irrelevant parts of the program from testing and focusing on reaching ...
    • Honest Majority and Beyond: Efficient Secure Computation over Small Population 

      Singla, Swati
      Secure Multi-Party Computation for small population has witnessed notable practically-efficient works in the setting of both honest majority and dishonest majority. While honest majority provides the promise of stronger ...
    • Learning to Adapt Policies for uSD card 

      Anand, Abhinav
      Machine Learning(ML) for Systems is a new and promising research area where performance of computer systems is optimized using machine learning methods. ML for Systems has outperformed traditional heuristics methods in ...
    • Optimizing Dense Matrix Computations with PolyMage 

      Kumudha, K N
      Linear algebra computations and other arbitrary affine accesses are ubiquitous in applications from domains like scientific computing, digital signal processing (DSP), and deep neural networks. Libraries such as OpenBLAS, ...
    • Practically Efficient Secure Small Party Computation over the Internet 

      Byali, Megha
      Secure Multi-party Computation (MPC) with small population has drawn focus specifically due to customization in techniques and resulting efficiency that the constructions can offer. Practically efficient constructions ...
    • Recommendations in Complex Networks: Unifying Structure into Random Walk 

      Nandanwar, Sharad
      Making recommendations or predicting links which are likely to exist in the future is one of the central problems in network science and graph mining. In spite of modern state-of- the-art approaches for link prediction, ...
    • Signcryption in a Quantum World 

      Puria, Shravan Kumar Parshuram
      With recent advancements and research on quantum computers, it is conjectured that in the foreseeable future, sufficiently large quantum computers will be built to break essentially all public key cryptosystems currently ...