Login / Signup
Aastha Mehta
ORCID
Publication Activity (10 Years)
Years Active: 2015-2024
Publications (10 Years): 11
Top Topics
Training And Testing Data
Database
Investment Decisions
Stream Processing
Top Venues
CoRR
USENIX Security Symposium
EdgeSys@EuroSys
EuroSys
</>
Publications
</>
Yuqin Yan
,
Pritish Mishra
,
Wei Huang
,
Aastha Mehta
,
Oana Balmau
,
David Lie
Stream Processing with Adaptive Edge-Enhanced Confidential Computing.
EdgeSys@EuroSys
(2024)
Amir Sabzi
,
Rut Vora
,
Swati Goswami
,
Margo I. Seltzer
,
Mathias Lécuyer
,
Aastha Mehta
NetShaper: A Differentially Private Network Side-Channel Mitigation System.
USENIX Security Symposium
(2024)
Kexin Li
,
Yang Xi
,
Aastha Mehta
,
David Lie
LDPKiT: Recovering Utility in LDP Schemes by Training with Noise^2.
CoRR
(2024)
Gargi Mitra
,
Pritam Dash
,
Yingao Elaine Yao
,
Aastha Mehta
,
Karthik Pattabiraman
ICS-Sniper: A Targeted Blackhole Attack on Encrypted ICS Traffic.
CoRR
(2023)
Amir Sabzi
,
Rut Vora
,
Swati Goswami
,
Margo I. Seltzer
,
Mathias Lécuyer
,
Aastha Mehta
NetShaper: A Differentially Private Network Side-Channel Mitigation System.
CoRR
(2023)
Aastha Mehta
,
Mohamed Alzayat
,
Roberta De Viti
,
Björn B. Brandenburg
,
Peter Druschel
,
Deepak Garg
Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud.
USENIX Security Symposium
(2022)
Gilles Barthe
,
Roberta De Viti
,
Peter Druschel
,
Deepak Garg
,
Manuel Gomez-Rodriguez
,
Pierfrancesco Ingo
,
Matthew Lentz
,
Aastha Mehta
,
Bernhard Schölkopf
PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation.
CoRR
(2020)
Aastha Mehta
,
Mohamed Alzayat
,
Roberta De Viti
,
Björn B. Brandenburg
,
Peter Druschel
,
Deepak Garg
Pacer: Network Side-Channel Mitigation in the Cloud.
CoRR
(2019)
Aastha Mehta
,
Eslam Elnikety
,
Katura Harvey
,
Deepak Garg
,
Peter Druschel
Qapla: Policy compliance for database-backed systems.
USENIX Security Symposium
(2017)
Olga Ohrimenko
,
Felix Schuster
,
Cédric Fournet
,
Aastha Mehta
,
Sebastian Nowozin
,
Kapil Vaswani
,
Manuel Costa
Oblivious Multi-Party Machine Learning on Trusted Processors.
USENIX Security Symposium
(2016)
Eslam Elnikety
,
Aastha Mehta
,
Anjo Vahldiek-Oberwagner
,
Deepak Garg
,
Peter Druschel
Thoth: Comprehensive Policy Compliance in Data Retrieval Systems.
USENIX Security Symposium
(2016)
Anjo Vahldiek-Oberwagner
,
Eslam Elnikety
,
Aastha Mehta
,
Deepak Garg
,
Peter Druschel
,
Rodrigo Rodrigues
,
Johannes Gehrke
,
Ansley Post
Guardat: enforcing data policies at the storage layer.
EuroSys
(2015)