From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors.. ACM Conference on Computer and Communications Security, стр. 2177. ACM, (2018)Zipper Stack: Shadow Stacks Without Shadow., , , , , , и . CoRR, (2019)Validation and Comparison of Seven Land Surface Evapotranspiration Products in the Haihe River Basin, China., , , и . Remote. Sens., 14 (17): 4308 (2022)Theory of commercial application management system and its implementation - AMPS., , , и . Parallel and Distributed Computing and Networks, стр. 75-83. IASTED/ACTA Press, (2007)Delta-Generalization: High Accuracy Data Release for Privacy Preserving., , , и . Trustcom/BigDataSE/ISPA, стр. 1861-1866. IEEE, (2016)An Adaptive Resource Sharing Platform for Internet Data Center., , , и . HPCC/EUC, стр. 1179-1186. IEEE, (2013)RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks., , , , , , , , и . ACM Trans. Archit. Code Optim., 15 (4): 50:1-50:21 (2019)Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks., , , , , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (4): 1280-1294 (апреля 2023)On weighted unbalanced linguistic aggregation operators in group decision making., и . Inf. Sci., (2013)Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations., , , , и . CoRR, (2022)