Secloak: Arm trustzone-based mobile peripheral control M Lentz, R Sen, P Druschel, B Bhattacharjee Proceedings of the 16th Annual International Conference on Mobile Systems …, 2018 | 87 | 2018 |
Encore: Private, context-based communication for mobile social apps P Aditya, V Erdélyi, M Lentz, E Shi, B Bhattacharjee, P Druschel Proceedings of the 12th annual international conference on Mobile systems …, 2014 | 49 | 2014 |
Brave new world: Privacy risks for mobile users P Aditya, B Bhattacharjee, P Druschel, V Erdélyi, M Lentz Proceedings of the ACM MobiCom workshop on Security and privacy in mobile …, 2014 | 34 | 2014 |
{SDDR}:{Light-Weight}, Secure Mobile Encounters M Lentz, V Erdélyi, P Aditya, E Shi, P Druschel, B Bhattacharjee 23rd USENIX Security Symposium (USENIX Security 14), 925-940, 2014 | 31 | 2014 |
Drowsy power management M Lentz, J Litton, B Bhattacharjee Proceedings of the 25th Symposium on Operating Systems Principles, 230-244, 2015 | 27 | 2015 |
D-mystifying the D-root Address Change M Lentz, D Levin, J Castonguay, N Spring, B Bhattacharjee Proceedings of the 2013 conference on Internet measurement conference, 57-62, 2013 | 20 | 2013 |
Dissecting service mesh overheads X Zhu, G She, B Xue, Y Zhang, Y Zhang, XK Zou, X Duan, P He, ... arXiv preprint arXiv:2207.00592, 2022 | 16 | 2022 |
Serving and optimizing machine learning workflows on heterogeneous infrastructures Y Wu, M Lentz, D Zhuo, Y Lu arXiv preprint arXiv:2205.04713, 2022 | 16 | 2022 |
Dynamic frequency resource allocation in heterogeneous cellular networks V Singh, M Lentz, B Bhattacharjee, RJ La, MA Shayman IEEE Transactions on Mobile Computing 15 (11), 2735-2748, 2016 | 15 | 2016 |
Listening to Bluetooth beacons for epidemic risk mitigation G Barthe, RD Viti, P Druschel, D Garg, M Gomez-Rodriguez, P Ingo, ... Scientific Reports 12 (1), 5558, 2022 | 14 | 2022 |
Remote Procedure Call as a Managed System Service J Chen, Y Wu, S Lin, Y Xu, X Kong, T Anderson, M Lentz, X Yang, D Zhuo | 12* | |
enclosure: Group communication via encounter closures L Tsai, R De Viti, M Lentz, S Saroiu, B Bhattacharjee, P Druschel Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019 | 9 | 2019 |
Dissecting overheads of service mesh sidecars X Zhu, G She, B Xue, Y Zhang, Y Zhang, XK Zou, XC Duan, P He, ... Proceedings of the 2023 ACM Symposium on Cloud Computing, 142-157, 2023 | 5 | 2023 |
PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation G Barthe, RD Viti, P Druschel, D Garg, M Gomez-Rodriguez, P Ingo, ... | 5 | 2020 |
Adaptive skeleton graph decoding S Jin, Y Wu, H Zheng, Q Zhang, M Lentz, ZM Mao, A Prakash, F Qian, ... arXiv preprint arXiv:2402.12280, 2024 | 3 | 2024 |
Computing in the Era of Large Generative Models: From Cloud-Native to AI-Native Y Lu, S Bian, L Chen, Y He, Y Hui, M Lentz, B Li, F Liu, J Li, Q Liu, R Liu, ... arXiv preprint arXiv:2401.12230, 2024 | 3 | 2024 |
Drsec: Flexible distributed representations for efficient endpoint security M Sharif, P Datta, A Riddle, K Westfall, A Bates, V Ganti, M Lentzk, D Ott 2024 IEEE Symposium on Security and Privacy (SP), 3609-3624, 2024 | 2 | 2024 |
Poirot: private contact summary aggregation Y Zhang, C Wang, D Pujol, J Bater, M Lentz, A Machanavajjhala, K Nayak, ... Proceedings of the 18th Conference on Embedded Networked Sensor Systems, 774-775, 2020 | 2 | 2020 |
Assurance and Control over Sensitive Data on Personal Devices M Lentz University of Maryland, College Park, 2020 | 2 | 2020 |
System and method for cross-architecture trusted execution environment migration Y Li, A Jaishankar, M Lentz, DE Ott US Patent 11,922,211, 2024 | 1 | 2024 |