Follow
Rosario Cammarota ("Ro")
Rosario Cammarota ("Ro")
Intel Labs
Verified email at ieee.org
Title
Cited by
Cited by
Year
Toward trustworthy AI development: mechanisms for supporting verifiable claims
M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ...
arXiv preprint arXiv:2004.07213, 2020
3252020
Post-quantum lattice-based cryptography implementations: A survey
H Nejatollahi, N Dutt, S Ray, F Regazzoni, I Banerjee, R Cammarota
ACM Computing Surveys (CSUR) 51 (6), 1-41, 2019
2432019
Improving cache management policies using dynamic reuse distances
N Duong, D Zhao, T Kim, R Cammarota, M Valero, AV Veidenbaum
2012 45Th annual IEEE/ACM international symposium on microarchitecture, 389-400, 2012
2102012
nGraph-HE2: A high-throughput framework for neural network inference on encrypted data
F Boemer, A Costache, R Cammarota, C Wierzynski
Proceedings of the 7th ACM workshop on encrypted computing & applied …, 2019
1862019
nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data
F Boemer, Y Lao, R Cammarota, C Wierzynski
Proceedings of the 16th ACM international conference on computing frontiers …, 2019
1402019
MP2ML: A mixed-protocol machine learning framework for private inference
F Boemer, R Cammarota, D Demmler, T Schneider, H Yalame
Proceedings of the 15th international conference on availability …, 2020
1122020
Maskednet: The first hardware inference engine aiming power side-channel protection
A Dubey, R Cammarota, A Aysu
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
682020
Scalable edge-based hyperdimensional learning system with brain-like neural adaptation
Z Zou, Y Kim, F Imani, H Alimohamadi, R Cammarota, M Imani
Proceedings of the International Conference for High Performance Computing …, 2021
602021
Methods for detecting security incidents in home networks
R Cammarota, P Tinnakornsrisuphap
US Patent App. 15/183,401, 2017
482017
Cryptopim: In-memory acceleration for lattice-based cryptographic hardware
H Nejatollahi, S Gupta, M Imani, TS Rosing, R Cammarota, N Dutt
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
462020
Method and system for predicting performance of software applications on prospective hardware architecture
A Kejariwal, P D'alberto, S Panigrahi, R Cammarota
US Patent 8,818,787, 2014
452014
BoMaNet: Boolean masking of an entire neural network
A Dubey, R Cammarota, A Aysu
Proceedings of the 39th International Conference on Computer-Aided Design, 1-9, 2020
432020
Biohd: an efficient genome sequence search platform using hyperdimensional memorization
Z Zou, H Chen, P Poduval, Y Kim, M Imani, E Sadredini, R Cammarota, ...
Proceedings of the 49th Annual International Symposium on Computer …, 2022
412022
Exploring energy efficient quantum-resistant signal processing using array processors
H Nejatollahi, S Shahhosseini, R Cammarota, N Dutt
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
352020
WebRTCbench: a benchmark for performance assessment of webRTC implementations
S Taheri, LA Beni, AV Veidenbaum, A Nicolau, R Cammarota, J Qiu, Q Lu, ...
2015 13th IEEE Symposium on embedded systems for real-time multimedia …, 2015
302015
Device provisioning protocol (dpp) using assisted bootstrapping
R Cammarota, P Tinnakornsrisuphap, JK Malinen
US Patent App. 15/713,176, 2018
272018
Domain-specific accelerators for ideal lattice-based public key protocols
H Nejatollahi, N Dutt, I Banerjee, R Cammarota
Cryptology ePrint Archive, 2018
252018
Cryptographic cipher with finite subfield lookup tables for use in masked operations
R Cammarota, OJ Benoit, A Palanigounder
US Patent App. 14/642,591, 2016
252016
Configurator key package for device provisioning protocol (DPP)
R Cammarota, JK Malinen, P Tinnakornsrisuphap
US Patent 10,547,448, 2020
242020
Self-adaptive Cache Architecture Based on Run-time Hardware Counters and Offline Profiling of Applications
R Cammarota, K Yalamanchili, A Ansari, AK Panda, RG Beraha
US Patent App. 14/801,329, 2017
242017
The system can't perform the operation now. Try again later.
Articles 1–20