Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zipper Stack: Shadow Stacks Without Shadow., , , , , , and . CoRR, (2019)SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors.. ACM Conference on Computer and Communications Security, page 2177. ACM, (2018)Theory of commercial application management system and its implementation - AMPS., , , and . Parallel and Distributed Computing and Networks, page 75-83. IASTED/ACTA Press, (2007)Robustness of fuzzy connectives and fuzzy reasoning with respect to general divergence measures., , , and . Fuzzy Sets Syst., (2016)Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection., , , and . ICTAI, page 947-954. IEEE, (2019)AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities., , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 341-356. Springer, (2019)DDM: A Demand-Based Dynamic Mitigation for SMT Transient Channels., , and . ISPA/BDCloud/SocialCom/SustainCom, page 614-621. IEEE, (2019)Validation and Comparison of Seven Land Surface Evapotranspiration Products in the Haihe River Basin, China., , , and . Remote. Sens., 14 (17): 4308 (2022)On weighted unbalanced linguistic aggregation operators in group decision making., and . Inf. Sci., (2013)HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption., , , , , , and . IEEE Trans. Parallel Distributed Syst., 34 (4): 1067-1081 (April 2023)