Author of the publication

NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64.

, , , , , , , and . IEEE Symposium on Security and Privacy, page 304-319. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborative Causal Inference with Fair Incentives., , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 28300-28320. PMLR, (2023)An emotion understanding system., , , , , and . ICSAI, page 264-270. IEEE, (2014)Theory framework for event structure slicing., , , and . ISCC, page 714-721. IEEE Computer Society, (2008)A new approach for rowhammer attacks., and . HOST, page 161-166. IEEE Computer Society, (2016)Surprise Simulation Using Fuzzy Logic., , , and . ICIC (2), volume 7996 of Lecture Notes in Computer Science, page 110-119. Springer, (2013)Uncovering Main Causalities for Long-tailed Information Extraction., , , , and . EMNLP (1), page 9683-9695. Association for Computational Linguistics, (2021)Helpful or Harmful Data? Fine-tuning-free Shapley Attribution for Explaining Language Model Predictions., , , , and . CoRR, (2024)Automatic Generation of Semantic Data for Event-Related Medical Guidelines., , , and . JIST, volume 9544 of Lecture Notes in Computer Science, page 154-163. Springer, (2015)A Principled Approach for ROP Defense., , and . ACSAC, page 101-110. ACM, (2015)ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks., , , , , , and . ASPLOS, page 743-755. ACM, (2016)