Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Inference in Machine Learning Services Using Trusted Execution Environments., , , , and . CoRR, (2019)Call graph prefetching for database applications., , and . ACM Trans. Comput. Syst., 21 (4): 412-444 (2003)A privacy mechanism for mobile-based urban traffic monitoring., , , , and . Pervasive Mob. Comput., (2015)FLIXR: Embedding Index Into Flash Translation Layer in SSDs., , , , and . IEEE Trans. Computers, 72 (1): 250-263 (2023)An efficient sequential consistency implementation with dynamic race detection for GPUs., and . J. Parallel Distributed Comput., (May 2024)DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware., , and . CoRR, (2022)Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems., , , , , , and . CoRR, (2022)KNOWME: a case study in wireless body area sensor network design., , , , , , , , , and 3 other author(s). IEEE Commun. Mag., 50 (5): 116-125 (2012)Warped gates: gating aware scheduling and power gating for GPGPUs., , and . MICRO, page 111-122. ACM, (2013)PageORAM: An Efficient DRAM Page Aware ORAM Strategy., , and . MICRO, page 91-107. IEEE, (2022)