Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalability Bottlenecks in Multi-Agent Reinforcement Learning Systems., , , and . CoRR, (2023)MPD: Moving Target Defense Through Communication Protocol Dialects., , , and . SecureComm (1), volume 398 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 100-119. Springer, (2021)Comprehensively and efficiently protecting the heap., , , , and . ASPLOS, page 207-218. ACM, (2006)RePRAM: Re-cycling PRAM faulty blocks for extended lifetime., , and . DSN, page 1-12. IEEE Computer Society, (2012)StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution., , , , , and . DSN, page 109-120. IEEE Computer Society, (2017)CC-Hunter: Uncovering Covert Timing Channels on Shared Processor Hardware., and . MICRO, page 216-228. IEEE Computer Society, (2014)Interference from GPU System Service Requests., , , and . IISWC, page 179-190. IEEE Computer Society, (2018)rPRAM: Exploring Redundancy Techniques to Improve Lifetime of PCM-based Main Memory., , , and . PACT, page 201-202. IEEE Computer Society, (2011)A Noise-resilient Detection Method against Advanced Cache Timing Channel Attack., , , , and . ACSSC, page 237-241. IEEE, (2018)Covert Timing Channels Exploiting Non-Uniform Memory Access based Architectures., , and . ACM Great Lakes Symposium on VLSI, page 155-160. ACM, (2017)