default search action
Ahmad Al Badawi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i15]Federico Mazzone, Ahmad Al Badawi, Yuriy Polyakov, Maarten H. Everts, Florian Hahn, Andreas Peter:
Investigating Privacy Attacks in the Gray-Box Setting to Enhance Collaborative Learning Schemes. CoRR abs/2409.17283 (2024) - [i14]Andreea Alexandru, Ahmad Al Badawi, Daniele Micciancio, Yuriy Polyakov:
Application-Aware Approximate Homomorphic Encryption: Configuring FHE for Practical Use. IACR Cryptol. ePrint Arch. 2024: 203 (2024) - 2023
- [j15]Taraf Al Nuaimi, Salama Al Zaabi, Mansor Alyilieli, Mohd AlMaskari, Salim Alblooshi, Fahad Alhabsi, Mohd Faizal Bin Yusof, Ahmad Al Badawi:
A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset. Intell. Syst. Appl. 20: 200298 (2023) - [c4]Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Nabeel, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew G. Schmidt, Brandon Reagen:
RPU: The Ring Processing Unit. ISPASS 2023: 272-282 - [i13]Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Thari Nabeel, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew G. Schmidt, Brandon Reagen:
RPU: The Ring Processing Unit. CoRR abs/2303.17118 (2023) - [i12]David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew G. Schmidt, Ajey P. Jacob, Benedict Reynwar, Kellie Canida, Akhilesh R. Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram:
TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation. CoRR abs/2304.05237 (2023) - [i11]Ahmad Al Badawi, Yuriy Polyakov:
Demystifying Bootstrapping in Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 149 (2023) - [i10]Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Thari Nabeel, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew G. Schmidt, Brandon Reagen:
RPU: The Ring Processing Unit. IACR Cryptol. ePrint Arch. 2023: 465 (2023) - [i9]David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew G. Schmidt, Ajey P. Jacob, Benedict Reynwar, Kellie Canida, Akhilesh R. Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram:
TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation. IACR Cryptol. ePrint Arch. 2023: 521 (2023) - [i8]Ravit Geva, Alexander Gusev, Yuriy Polyakov, Lior Liram, Oded Rosolio, Andreea Alexandru, Nicholas Genise, Marcelo Blatt, Zohar Duchin, Barliz Waissengrin, Dan Mirelman, Felix Bukstein, Deborah T. Blumenthal, Ido Wolf, Sharon Pelles-Avraham, Tali Schaffer, Lee A. Lavi, Daniele Micciancio, Vinod Vaikuntanathan, Ahmad Al Badawi, Shafi Goldwasser:
Collaborative Privacy-Preserving Analysis of Oncological Data using Multiparty Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1203 (2023) - 2022
- [j14]Qasem Abu Al-Haija, Ahmad Al Badawi, Giridhar Reddy Bojja:
Boost-Defence for resilient IoT networks: A head-to-toe approach. Expert Syst. J. Knowl. Eng. 39(10) (2022) - [j13]Qasem Abu Al-Haija, Ahmad Al Badawi:
High-performance intrusion detection system for networked UAVs via deep learning. Neural Comput. Appl. 34(13): 10885-10900 (2022) - [j12]Ahmad Al Badawi, Ling Chen, Saru Vig:
Fast homomorphic SVM inference on encrypted data. Neural Comput. Appl. 34(18): 15555-15573 (2022) - [j11]Qasem Abu Al-Haija, Ahmad Al Badawi:
Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning. Sensors 22(1): 241 (2022) - [c3]Ahmad Al Badawi, Jack Bates, Flávio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Ian Quah, Yuriy Polyakov, R. V. Saraswathy, Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, Vincent Zucca:
OpenFHE: Open-Source Fully Homomorphic Encryption Library. WAHC@CCS 2022: 53-63 - [i7]Ahmad Al Badawi, Jack Bates, Flávio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Ian Quah, Yuriy Polyakov, R. V. Saraswathy, Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, Vincent Zucca:
OpenFHE: Open-Source Fully Homomorphic Encryption Library. IACR Cryptol. ePrint Arch. 2022: 915 (2022) - 2021
- [j10]Jestine Paul, Meenatchi Sundaram Muthu Selva Annamalai, William Ming, Ahmad Al Badawi, Bharadwaj Veeravalli, Khin Mi Mi Aung:
Privacy-Preserving Collective Learning With Homomorphic Encryption. IEEE Access 9: 132084-132096 (2021) - [j9]Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff:
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. IEEE Trans. Emerg. Top. Comput. 9(2): 941-956 (2021) - [j8]Ahmad Al Badawi, Chao Jin, Jie Lin, Chan Fook Mun, Sim Jun Jie, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar:
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs. IEEE Trans. Emerg. Top. Comput. 9(3): 1330-1343 (2021) - [j7]Ahmad Al Badawi, Bharadwaj Veeravalli, Jie Lin, Xiao Nan, Kazuaki Matsumura, Khin Mi Mi Aung:
Multi-GPU Design and Performance Evaluation of Homomorphic Encryption on GPU Clusters. IEEE Trans. Parallel Distributed Syst. 32(2): 379-391 (2021) - [c2]Chan Fook Mun, Ahmad Qaisar, Ahmad Al Badawi, Sim Jun Jie, Benjamin Hong Meng Tan, Foo Chuan Sheng, Khin Mi Mi Aung:
Genotype Imputation with Homomorphic Encryption. ICBIP 2021: 9-13 - 2020
- [j6]Ahmad Al Badawi, Louie Hoang, Chan Fook Mun, Kim Laine, Khin Mi Mi Aung:
PrivFT: Private and Fast Text Classification With Homomorphic Encryption. IEEE Access 8: 226544-226556 (2020) - [j5]HeeWon Chung, Myungsun Kim, Ahmad Al Badawi, Khin Mi Mi Aung, Bharadwaj Veeravalli:
Homomorphic Comparison for Point Numbers with User-Controllable Precision and Its Applications. Symmetry 12(5): 788 (2020)
2010 – 2019
- 2019
- [i6]Jin Chao, Ahmad Al Badawi, Balagopal Unnikrishnan, Jie Lin, Chan Fook Mun, James M. Brown, J. Peter Campbell, Michael F. Chiang, Jayashree Kalpathy-Cramer, Vijay Ramaseshan Chandrasekhar, Pavitra Krishnaswamy, Khin Mi Mi Aung:
CaRENets: Compact and Resource-Efficient CNN for Homomorphic Inference on Encrypted Medical Images. CoRR abs/1901.10074 (2019) - [i5]Ahmad Al Badawi, Luong Hoang, Chan Fook Mun, Kim Laine, Khin Mi Mi Aung:
PrivFT: Private and Fast Text Classification with Homomorphic Encryption. CoRR abs/1908.06972 (2019) - 2018
- [j4]Ahmad Al Badawi, Bharadwaj Veeravalli, Khin Mi Mi Aung, Brahim Hamadicharef:
Accelerating subset sum and lattice based public-key cryptosystems with multi-core CPUs and GPUs. J. Parallel Distributed Comput. 119: 179-190 (2018) - [j3]Ahmad Al Badawi, Bharadwaj Veeravalli, Chan Fook Mun, Khin Mi Mi Aung:
High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 70-95 (2018) - [c1]Ahmad Al Badawi, Bharadwaj Veeravalli, Khin Mi Mi Aung:
Faster Number Theoretic Transform on Graphics Processors for Ring Learning with Errors Based Cryptography. SOLI 2018: 26-31 - [i4]Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Sim Jun Jie, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar:
The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs. CoRR abs/1811.00778 (2018) - [i3]Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff:
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2018: 589 (2018) - [i2]Ahmad Al Badawi, Jin Chao, Jie Lin, Chan Fook Mun, Sim Jun Jie, Benjamin Hong Meng Tan, Xiao Nan, Khin Mi Mi Aung, Vijay Ramaseshan Chandrasekhar:
The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs. IACR Cryptol. ePrint Arch. 2018: 1056 (2018) - 2013
- [j2]Ahmad Al Badawi, Ali M. Shatnawi:
Static scheduling of directed acyclic data flow graphs onto multiprocessors using particle swarm optimization. Comput. Oper. Res. 40(10): 2322-2328 (2013) - [j1]Qasem Abu Al-Haija, Ahmad Al Badawi:
Cost-effective design for binary Edwards elliptic curves crypto-processor over GF (2N) using parallel multipliers and architectures. Int. J. Inf. Comput. Secur. 5(3): 236-250 (2013) - [i1]Ahmad Al Badawi, Qasem Abu Al-Haija:
IRS for Computer Character Sequences Filtration: a new software tool and algorithm to support the IRS at tokenization process. CoRR abs/1303.0407 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint