Author of the publication

Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.

, , , , , , , , and . IEEE Trans. Computers, 69 (11): 1571-1583 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MART: Improving LLM Safety with Multi-round Automatic Red-Teaming., , , , , , , and . CoRR, (2023)PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter., , , , , , , , and . CoRR, (2020)The value of secondary markets when consumers are socially conscious., , and . Oper. Res., 24 (1): 7 (March 2024)Distributed Iterative Learning Formation control for Nonholonomic Multiple Wheeled Mobile Robots with Channel Noise., , , , and . Inf. Technol. Control., 50 (3): 588-600 (2021)Complex dynamic analysis of risk-averse newsvendor models with buyback guarantee financing., , , and . Int. J. Prod. Res., 60 (9): 2865-2883 (2022)Int-Monitor: a model triggered hardware trojan in deep learning accelerators., and . J. Supercomput., 79 (3): 3095-3111 (2023)Dynamical complexity of pricing and green level for a dyadic supply chain with capital constraint., , , , and . Math. Comput. Simul., (2022)Research on the two-way defense model of large data dynamic security SAT., , and . Clust. Comput., 20 (2): 1237-1246 (2017)Predicting breast cancer recurrence and metastasis risk by integrating color and texture features of histopathological images and machine learning technologies., , , , , , , , , and 1 other author(s). Comput. Biol. Medicine, (2022)DaMN - Discriminative and Mutually Nearest: Exploiting Pairwise Category Proximity for Video Action Recognition., , , and . ECCV (3), volume 8691 of Lecture Notes in Computer Science, page 721-736. Springer, (2014)