Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference., , and . NeurIPS, (2020)Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption., , , , , and . CAV (1), volume 13371 of Lecture Notes in Computer Science, page 447-468. Springer, (2022)BUNET: Blind Medical Image Segmentation Based on Secure UNET., , , , and . MICCAI (2), volume 12262 of Lecture Notes in Computer Science, page 612-622. Springer, (2020)DWE: decrypting learning with errors with errors., , and . DAC, page 3:1-3:6. ACM, (2018)LSTA: Learning-Based Static Timing Analysis for High-Dimensional Correlated On-Chip Variations., , , and . DAC, page 66:1-66:6. ACM, (2017)Privacy-Preserving Medical Image Segmentation via Hybrid Trusted Execution Environment., , and . DAC, page 1347-1350. IEEE, (2021)Nonlinear delay-table approach for full-chip NBTI degradation prediction., , , , and . ISQED, page 307-312. IEEE, (2016)A study on NBTI-induced delay degradation considering stress frequency dependence., , , , , and . ISQED, page 251-256. IEEE, (2018)Oblivious Monitoring for Discrete-Time STL via Fully Homomorphic Encryption., , , , , , and . CoRR, (2024)Computing in the Era of Large Generative Models: From Cloud-Native to AI-Native., , , , , , , , , and 12 other author(s). CoRR, (2024)