Author of the publication

Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.

, , , , , , , , and . IEEE Trans. Computers, 69 (11): 1571-1583 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the TL-transitivity of fuzzy similarity measures., , , and . Fuzzy Sets Syst., (2017)A Novel Technique for Noise Reduction in InSAR Images., , , and . IEEE Geosci. Remote. Sens. Lett., 4 (2): 226-230 (2007)Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise., , , , , and . ACM Conference on Computer and Communications Security, page 1777-1794. ACM, (2019)A Comparison of Six Forest Mapping Products in Southeast Asia, Aided by Field Validation Data., , , , , and . Remote. Sens., 15 (18): 4584 (September 2023)TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU., , , , , and . CoRR, (2022)Three-way multi-granularity learning towards open topic classification., , , , , and . Inf. Sci., (2022)Monitoring Coastline Changes of the Malay Islands Based on Google Earth Engine and Dense Time-Series Remote Sensing Images., , , , , , , , , and . Remote. Sens., 13 (19): 3842 (2021)PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter., , , , , , , , and . CoRR, (2020)Knowledge Federation: Hierarchy and Unification., , and . CoRR, (2020)A Lightweight Isolation Mechanism for Secure Branch Predictors., , , , , , , and . CoRR, (2020)