From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Greedy Step Averaging: A parameter-free stochastic optimization method., , и . CoRR, (2016)STREAM: Towards READ-based In-Memory Computing for Streaming based Data Processing., , , , и . ASP-DAC, стр. 690-695. IEEE, (2022)DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips., , и . USENIX Security Symposium, стр. 1463-1480. USENIX Association, (2020)Personalized Decision Supports based on Theory of Mind Modeling and Explainable Reinforcement Learning., , , , и . SMC, стр. 4865-4870. IEEE, (2023)Multi-Agent Learning for Iterative Dominance Elimination: Formal Barriers and New Algorithms., , и . COLT, том 178 из Proceedings of Machine Learning Research, стр. 543. PMLR, (2022)Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors., , , , и . SP, стр. 1440-1457. IEEE, (2022)A Noise-resilient Detection Method against Advanced Cache Timing Channel Attack., , , , и . ACSSC, стр. 237-241. IEEE, (2018)Decepticon: Attacking Secrets of Transformers., , , , и . IISWC, стр. 128-139. IEEE, (2023)Covert Timing Channels Exploiting Non-Uniform Memory Access based Architectures., , и . ACM Great Lakes Symposium on VLSI, стр. 155-160. ACM, (2017)StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution., , , , , и . DSN, стр. 109-120. IEEE Computer Society, (2017)