From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SESAME: Software defined Enclaves to Secure Inference Accelerators with Multi-tenant Execution., , , и . CoRR, (2020)Power-based Attacks on Spatial DNN Accelerators., , и . ACM J. Emerg. Technol. Comput. Syst., 18 (3): 58:1-58:18 (2022)Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses., , , , , , , , , и . ACM J. Emerg. Technol. Comput. Syst., 17 (3): 42:1-42:38 (2021)A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags., , , , и . MICRO, стр. 94-105. IEEE Computer Society, (2008)Vulnerability-tolerant secure architectures., , , , и . ICCAD, стр. 46. ACM, (2018)Opportunities and Challenges of Using Plasmonic Components in Nanophotonic Architectures., , , , , , , и . IEEE J. Emerg. Sel. Topics Circuits Syst., 2 (2): 154-168 (2012)Secure, Precise, and Fast Floating-Point Operations on x86 Processors., , и . USENIX Security Symposium, стр. 71-86. USENIX Association, (2016)ρ: Relaxed Hierarchical ORAM., , , и . ASPLOS, стр. 659-671. ACM, (2019)Binary Ring-LWE hardware with power side-channel countermeasures., , и . DATE, стр. 1253-1258. IEEE, (2018)Language without words: A pointillist model for natural language processing., , , , , , и . SCIS&ISIS, стр. 11-15. IEEE, (2012)