From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses., , , , , , , , , и . ACM J. Emerg. Technol. Comput. Syst., 17 (3): 42:1-42:38 (2021)A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags., , , , и . MICRO, стр. 94-105. IEEE Computer Society, (2008)Secure, Precise, and Fast Floating-Point Operations on x86 Processors., , и . USENIX Security Symposium, стр. 71-86. USENIX Association, (2016)Vulnerability-tolerant secure architectures., , , , и . ICCAD, стр. 46. ACM, (2018)Binary Ring-LWE hardware with power side-channel countermeasures., , и . DATE, стр. 1253-1258. IEEE, (2018)ρ: Relaxed Hierarchical ORAM., , , и . ASPLOS, стр. 659-671. ACM, (2019)Language without words: A pointillist model for natural language processing., , , , , , и . SCIS&ISIS, стр. 11-15. IEEE, (2012)Execution leases: a hardware-supported mechanism for enforcing strong non-interference., , , , и . MICRO, стр. 493-504. ACM, (2009)Cognitive Defense Cyber Attack Prediction and Security Design in Machine Learning Model., , , , , и . IC3I, стр. 1361-1366. IEEE, (2023)NeuroBack: Improving CDCL SAT Solving using Graph Neural Networks., , , , , и . ICLR, OpenReview.net, (2024)