From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption., , , , и . USENIX Security Symposium, стр. 4697-4714. USENIX Association, (2023)DaCapo: Automatic Bootstrapping Management for Efficient Fully Homomorphic Encryption., , , , , , , и . USENIX Security Symposium, USENIX Association, (2024)Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof., , , , , и . NDSS, The Internet Society, (2023)Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations., , , , , , , и . CCS, стр. 328-339. ACM, (2015)Homogeneity-Based Transmissive Process to Model True and False News in Social Networks., , и . CoRR, (2018)Models and Benchmarks for Representation Learning of Partially Observed Subgraphs., , , и . CIKM, стр. 4118-4122. ACM, (2022)Performance-aware Scale Analysis with Reserve for Homomorphic Encryption., , , , и . ASPLOS (1), стр. 302-317. ACM, (2024)Perceptions to Beliefs: Exploring Precursory Inferences for Theory of Mind in Large Language Models., , , , , , , и . CoRR, (2024)Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels., , , , и . NDSS, The Internet Society, (2023)Pay as You Want: Bypassing Charging System in Operational Cellular Networks., , , , , , и . WISA, том 10144 из Lecture Notes in Computer Science, стр. 148-160. (2016)