{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T15:30:08Z","timestamp":1773588608353,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,3,22]]},"DOI":"10.1145\/3779212.3790138","type":"proceedings-article","created":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:55:26Z","timestamp":1773150926000},"page":"342-360","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CHEHAB RL: Learning to Optimize Fully Homomorphic Encryption Computations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9367-4678","authenticated-orcid":false,"given":"Bilel","family":"Sefsaf","sequence":"first","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, United Arab Emirates and Ecole Superieure d'Informatique, Algiers, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5301-4388","authenticated-orcid":false,"given":"Abderraouf","family":"Dandani","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, United Arab Emirates and Ecole Superieure d'Informatique, Algiers, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4452-0777","authenticated-orcid":false,"given":"Abdessamed","family":"Seddiki","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, United Arab Emirates and Ecole Superieure d'Informatique, Algiers, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1471-0431","authenticated-orcid":false,"given":"Arab","family":"Mohammed","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, United Arab Emirates and Ecole Superieure d'Informatique, Algiers, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1938-912X","authenticated-orcid":false,"given":"Eduardo","family":"Chielle","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6899-0651","authenticated-orcid":false,"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9350-3998","authenticated-orcid":false,"given":"Riyadh","family":"Baghdadi","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, United Arab Emirates"}]}],"member":"320","published-online":{"date-parts":[[2026,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ullman","author":"Aho Alfred V.","year":"2006","unstructured":"Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman. 2006. Compilers: Principles, Techniques, and Tools (2 ed.). Addison-Wesley, Boston, MA, USA."},{"key":"e_1_3_2_1_2_1","volume-title":"Meron Zerihun Demissie, and Hongren Zheng","author":"Ali Asra","year":"2025","unstructured":"Asra Ali, Jaeho Choi, Bryant Gipson, Shruthi Gorantala, Jeremy Kun, Wouter Legiest, Lawrence Lim, Alexander Viand, Meron Zerihun Demissie, and Hongren Zheng. 2025. HEIR: A Universal Compiler for Homomorphic Encryption. arXiv:2508.11095 [cs.CR]. arXiv:2508.11095 [cs.CR]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358945"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CASES55004.2022.00008"},{"key":"e_1_3_2_1_5_1","unstructured":"Riyadh Baghdadi. 2015. Improving tiling reducing compilation time and extending the scope of polyhedral compilation. Ph.D. Dissertation. Paris 6."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2019.8661197"},{"key":"e_1_3_2_1_7_1","volume-title":"Emanuele Del Sozzo, Patricia Suriana, Shoaib Kamil, and Saman P Amarasinghe.","author":"Baghdadi Riyadh","year":"2018","unstructured":"Riyadh Baghdadi, Jessica Ray, Malek Ben Romdhane, Emanuele Del Sozzo, Patricia Suriana, Shoaib Kamil, and Saman P Amarasinghe. 2018. Tiramisu: A code optimization framework for high performance systems. arXiv preprint arXiv:1804.10694 (2018)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1379022.1375595"},{"key":"e_1_3_2_1_9_1","first-page":"101","article-title":"A practical automatic polyhedral parallelizer and locality optimizer","author":"Bondhugula Uday","year":"2008","unstructured":"Uday Bondhugula, Albert Hartono, J. Ramanujam, and P. Sadayappan. 2008b. A practical automatic polyhedral parallelizer and locality optimizer. In PLDI. 101-113.","journal-title":"PLDI."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT52795.2021.00009"},{"key":"e_1_3_2_1_12_1","first-page":"3389","article-title":"Learning to optimize tensor programs","author":"Chen Tianqi","year":"2018","unstructured":"Tianqi Chen, Lianmin Zheng, Eddie Yan, Ziheng Jiang, Thierry Moreau, Luis Ceze, Carlos Guestrin, and Arvind Krishnamurthy. 2018. Learning to optimize tensor programs. In Advances in Neural Information Processing Systems. 3389-3400.","journal-title":"Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446692"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Sangeeta Chowdhary Wei Dai Kim Laine and Olli Saarikivi. 2021. EVA Improved: Compiler and Extension Library for CKKS. Cryptology ePrint Archive Paper 2021\/1505. https:\/\/doi.org\/10.1145\/3474366.3486929 https:\/\/eprint.iacr.org\/2021\/1505.","DOI":"10.1145\/3474366.3486929"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454050"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO53902.2022.9741258"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1423"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3676641.3716008"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/996893.996853"},{"key":"e_1_3_2_1_22_1","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. Cryptology ePrint Archive Paper 2012\/144. https:\/\/eprint.iacr.org\/2012\/144"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129626412500107"},{"key":"e_1_3_2_1_25_1","volume-title":"Privacy-preserving genotype imputation with fully homomorphic encryption. Cell systems","author":"G\u00fcrsoy Gamze","year":"2022","unstructured":"Gamze G\u00fcrsoy, Eduardo Chielle, Charlotte M Brannon, Michail Maniatakos, and Mark Gerstein. 2022. Privacy-preserving genotype imputation with fully homomorphic encryption. Cell systems, Vol. 13, 2 (2022), 173-182."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368826.3377928"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-023-00758-5"},{"key":"e_1_3_2_1_28_1","unstructured":"Information Commissioner's Office. 2023. Case study: homomorphic encryption for data sharing. https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/data-sharing\/privacy-enhancing-technologies\/case-studies\/homomorphic-encryption-for-data-sharing\/ Accessed: 2025-08-17."},{"key":"e_1_3_2_1_29_1","first-page":"319","volume-title":"Supernode Partitioning. In POPL'88","author":"Irigoin F.","unstructured":"F. Irigoin and R. Triolet. 1988. Supernode Partitioning. In POPL'88. San Diego, CA, 319-328."},{"key":"e_1_3_2_1_30_1","unstructured":"Lei Jiang and Lei Ju. 2022. FHEBench: Benchmarking Fully Homomorphic Encryption Schemes. arXiv:2203.00728 [cs.CR] https:\/\/arxiv.org\/abs\/2203.00728"},{"key":"e_1_3_2_1_31_1","volume-title":"Allen","author":"Kennedy Ken","year":"2001","unstructured":"Ken Kennedy and John R. Allen. 2001. Optimizing compilers for modern architectures: a dependence-based approach. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cels.2021.07.010"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349320"},{"key":"e_1_3_2_1_34_1","unstructured":"Kristin Lauter Sreekanth Kannepalli Kim Laine and Radames Cruz Moreno. 2021. Password Monitor: Safeguarding passwords in Microsoft Edge. Microsoft Research Blog. https:\/\/www.microsoft.com\/en-us\/research\/blog\/password-monitor-safeguarding-passwords-in-microsoft-edge\/ Accessed: 2025-08-17."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO53902.2022.9741265"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3696443.3708924"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582057"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276480"},{"key":"e_1_3_2_1_39_1","volume-title":"Iheb Nassim Aouadj, Nassim Tchoulak, Islem Kara Bernou, Hamza Benyamina, Fatima Benbouzid-Si Tayeb, Karima Benatchba, Hugh Leather, and Riyadh Baghdadi.","author":"Merouani Massinissa","year":"2024","unstructured":"Massinissa Merouani, Khaled Afif Boudaoud, Iheb Nassim Aouadj, Nassim Tchoulak, Islem Kara Bernou, Hamza Benyamina, Fatima Benbouzid-Si Tayeb, Karima Benatchba, Hugh Leather, and Riyadh Baghdadi. 2024. LOOPer: A Learned Automatic Code Optimizer For Polyhedral Compilers. arXiv preprint arXiv:2403.11522 (2024)."},{"key":"e_1_3_2_1_40_1","volume-title":"https:\/\/github.com\/Microsoft\/SEAL","author":"Research Microsoft","unstructured":"Microsoft Research. 2023. Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL. Redmond, WA."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428234"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5753\/wscad.2019.8655"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304059"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3150211"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133255.1133996"},{"key":"e_1_3_2_1_46_1","unstructured":"John Schulman Filip Wolski Prafulla Dhariwal Alec Radford and Oleg Klimov. 2017. Proximal Policy Optimization Algorithms. arXiv preprint arXiv:1707.06347. https:\/\/arxiv.org\/abs\/1707.06347"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1162"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378852"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2009.18"},{"key":"e_1_3_2_1_50_1","volume-title":"MLGO: A Machine Learning Guided Compiler Optimizations Framework. arXiv preprint arXiv:2101.04808. https:\/\/arxiv.org\/abs\/2101.04808","author":"Trofin Mircea","year":"2021","unstructured":"Mircea Trofin, Yundi Qian, Eugene Brevdo, Zinan Lin, Krzysztof Choromanski, and David Li. 2021. MLGO: A Machine Learning Guided Compiler Optimizations Framework. arXiv preprint arXiv:2101.04808. https:\/\/arxiv.org\/abs\/2101.04808"},{"key":"e_1_3_2_1_51_1","volume-title":"Advances in Neural Information Processing Systems 30 (NIPS","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention Is All You Need. In Advances in Neural Information Processing Systems 30 (NIPS 2017), I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.). Curran Associates, Inc., Red Hook, NY, USA, 5998-6008. http:\/\/papers.nips.cc\/paper\/7181-attention-is-all-you-need.pdf"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3578360.3580273"},{"key":"e_1_3_2_1_53_1","first-page":"4133","volume-title":"HECO: Fully Homomorphic Encryption Compiler. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Viand Alexander","year":"2022","unstructured":"Alexander Viand, Patrick Jattke, Miro Haller, and Anwar Hithnawi. 2022. HECO: Fully Homomorphic Encryption Compiler. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Berkeley, CA, USA, 4133-4150. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/viand"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2817118"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3696443.3708917"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation (OSDI'20)","author":"Zheng Lianmin","year":"2020","unstructured":"Lianmin Zheng, Chengfan Jia, Minmin Sun, Zhao Wu, Cody Hao Yu, Ameer Haj-Ali, Yida Wang, Jun Yang, Danyang Zhuo, Koushik Sen, Joseph E. Gonzalez, and Ion Stoica. 2020. Ansor: generating high-performance tensor programs for deep learning. In Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation (OSDI'20). USENIX Association, USA, Article 49, 17 pages."}],"event":{"name":"ASPLOS '26: 31st ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Pittsburgh PA USA","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 31st ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T13:56:12Z","timestamp":1773582972000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3779212.3790138"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,22]]},"references-count":56,"alternative-id":["10.1145\/3779212.3790138","10.1145\/3779212"],"URL":"https:\/\/doi.org\/10.1145\/3779212.3790138","relation":{},"subject":[],"published":{"date-parts":[[2026,3,22]]},"assertion":[{"value":"2026-03-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}