From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Silhouette: Efficient Intra-Address Space Isolation for Protected Shadow Stacks on Embedded Systems., , , , , и . CoRR, (2019)Silhouette: Efficient Protected Shadow Stacks for Embedded Systems., , , , , и . USENIX Security Symposium, стр. 1219-1236. USENIX Association, (2020)Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage., , , , , и . USENIX Security Symposium, стр. 2281-2298. USENIX Association, (2022)Automatic Recovery of Fine-grained Compiler Artifacts at the Binary Level., , , и . USENIX Annual Technical Conference, стр. 853-868. USENIX Association, (2022)Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level., , , , и . CCS, стр. 2695-2709. ACM, (2023)Design of an efficient and robust multimedia gateway for pervasive communication., , и . WTS, стр. 334-340. IEEE, (2008)Toward ubiquitous Video-based Cyber-Physical Systems., , , , , и . SMC, стр. 48-53. IEEE, (2008)Separating the Wheat from the Chaff: Using Indexing and Sub-Sequence Mining Techniques to Identify Related Crashes During Bug Triage., , , и . QRS, стр. 31-42. IEEE, (2022)Optimizing data query performance of Bi-cluster for large-scale scientific data in supercomputers., , , , , и . J. Supercomput., 78 (2): 2417-2441 (2022)Inter-harmonics analysis and parameter estimation based on H2R6 window and constructing low-interference zone., , , , и . IET Commun., 14 (1): 28-36 (2020)