Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2286-2303 (2022)Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 4187-4203 (2022)EffiBench: Benchmarking the Efficiency of Automatically Generated Code., , , and . CoRR, (2024)CRONUS: Fault-isolated, Secure and High-performance Heterogeneous Computing for Trusted Execution Environment., , , , , , , , , and . MICRO, page 124-143. IEEE, (2022)How Local Information Improves Rendezvous in Cognitive Radio Networks., , , , , , , and . SECON, page 352-360. IEEE, (2018)Determinism Is Overrated: What Really Makes Multithreaded Programs Hard to Get Right and What Can Be Done About It., , and . HotPar, USENIX Association, (2013)Achieving low tail-latency and high scalability for serializable transactions in edge computing., , , , , , , , and . EuroSys, page 210-227. ACM, (2021)Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks., , , , , , , , , and 1 other author(s). SOSP, page 18-34. ACM, (2021)SOTER: Guarding Black-box Inference for General Neural Networks at the Edge., , , , , , , , , and 2 other author(s). USENIX Annual Technical Conference, page 723-738. USENIX Association, (2022)Verifying systems rules using rule-directed symbolic execution., , , and . ASPLOS, page 329-342. ACM, (2013)