Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of ADHD Based on Eye Movements During Natural Viewing., , , , , , , , , and . ECML/PKDD (6), volume 13718 of Lecture Notes in Computer Science, page 403-418. Springer, (2022)Online Blind Reverberation Time Estimation Using CRNNs., , and . INTERSPEECH, page 5061-5065. ISCA, (2020)Eyettention: An Attention-based Dual-Sequence Model for Predicting Human Scanpaths during Reading., , , , , and . Proc. ACM Hum. Comput. Interact., 7 (ETRA): 1-24 (May 2023)New Predictor-Based Attacks in Processors., and . DAC, page 697-702. IEEE, (2021)XMSS and Embedded Systems., , , , , , and . SAC, volume 11959 of Lecture Notes in Computer Science, page 523-550. Springer, (2019)Reading Does Not Equal Reading: Comparing, Simulating and Exploiting Reading Behavior across Populations., , , , and . LREC/COLING, page 13586-13594. ELRA and ICCL, (2024)A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks., , and . ASPLOS, page 683-697. ACM, (2020)ASPLOS 2020 was canceled because of COVID-19..TroScan: Enhancing On-Chip Delivery Resilience to Physical Attack Through Frequency-Triggered Key Generation., , , , and . DATE, page 1-6. IEEE, (2024)Single-Channel Blind Direct-to-Reverberation Ratio Estimation Using Masking., , and . INTERSPEECH, page 5066-5070. ISCA, (2020)Evaluation of Cache Attacks on Arm Processors and Secure Caches., , , , and . CoRR, (2021)