Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Inference in Machine Learning Services Using Trusted Execution Environments., , , , and . CoRR, (2019)KNOWME: a case study in wireless body area sensor network design., , , , , , , , , and 3 other author(s). IEEE Commun. Mag., 50 (5): 116-125 (2012)A privacy mechanism for mobile-based urban traffic monitoring., , , , and . Pervasive Mob. Comput., (2015)An efficient sequential consistency implementation with dynamic race detection for GPUs., and . J. Parallel Distributed Comput., (May 2024)FLIXR: Embedding Index Into Flash Translation Layer in SSDs., , , , and . IEEE Trans. Computers, 72 (1): 250-263 (2023)Call graph prefetching for database applications., , and . ACM Trans. Comput. Syst., 21 (4): 412-444 (2003)DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware., , and . CoRR, (2022)Warped gates: gating aware scheduling and power gating for GPGPUs., , and . MICRO, page 111-122. ACM, (2013)PageORAM: An Efficient DRAM Page Aware ORAM Strategy., , and . MICRO, page 91-107. IEEE, (2022)Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning., , , , , and . IPDPS, page 628-638. IEEE, (2022)