From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

V0LTpwn: Attacking x86 Processor Integrity from Software., , , , и . CoRR, (2019)ACM CCS 2016 Interviews, Part 1., и . IEEE Secur. Priv., 15 (2): 88-91 (2017)Security & Privacy Week Interviews, Part 1., и . IEEE Secur. Priv., 14 (5): 58-67 (2016)Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants., , и . AsiaCCS, стр. 465-478. ACM, (2019)Digital contact Tracing solutions: Promises, Pitfalls and Challenges., , , , и . ArXiv I arXiv 2202.06698v2 (October 2022), (октября 2022)VirTEE: a full backward-compatible TEE with native live migration and secure I/O., , , , , , , и . DAC, стр. 241-246. ACM, (2022)Offline Model Guard: Secure and Private ML on Mobile Devices., , , , , , , и . DATE, стр. 460-465. IEEE, (2020)Long Live Randomization: On Privacy-preserving Contact Tracing in Pandemic., , и . MTD@CCS, стр. 1-9. ACM, (2020)FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants., , , , , и . CCS, стр. 1861-1883. ACM, (2021)RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints., , , , и . CCS, стр. 2890-2905. ACM, (2021)