Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption., , , , , and . CAV (1), volume 13371 of Lecture Notes in Computer Science, page 447-468. Springer, (2022)AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference., , and . NeurIPS, (2020)DArL: Dynamic Parameter Adjustment for LWE-based Secure Inference., , and . DATE, page 1739-1744. IEEE, (2019)DWE: decrypting learning with errors with errors., , and . DAC, page 3:1-3:6. ACM, (2018)LSTA: Learning-Based Static Timing Analysis for High-Dimensional Correlated On-Chip Variations., , , and . DAC, page 66:1-66:6. ACM, (2017)Privacy-Preserving Medical Image Segmentation via Hybrid Trusted Execution Environment., , and . DAC, page 1347-1350. IEEE, (2021)BUNET: Blind Medical Image Segmentation Based on Secure UNET., , , , and . MICCAI (2), volume 12262 of Lecture Notes in Computer Science, page 612-622. Springer, (2020)Nonlinear delay-table approach for full-chip NBTI degradation prediction., , , , and . ISQED, page 307-312. IEEE, (2016)A study on NBTI-induced delay degradation considering stress frequency dependence., , , , , and . ISQED, page 251-256. IEEE, (2018)Oblivious Monitoring for Discrete-Time STL via Fully Homomorphic Encryption., , , , , , and . CoRR, (2024)