From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Fetching Tale: Covert Communication with the Hardware Prefetcher., и . HOST, стр. 101-110. IEEE, (2019)Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage., , , и . USENIX Security Symposium, стр. 681-698. USENIX Association, (2021)Securing Cyber-Physical Systems from Hardware Trojan Collusion., , и . IEEE Trans. Emerg. Top. Comput., 8 (3): 655-667 (2020)Facilitating the Iterative Design of Informatics Tools to Advance the Science of Autism., , , , , , и . MIE, том 169 из Studies in Health Technology and Informatics, стр. 955-959. IOS Press, (2011)Regularity theories disconfirmed: a revamped argument and a wager.. Synth., 194 (12): 4913-4933 (2017)Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints., , , и . SP, стр. 1002-1017. IEEE, (2022)An Exploration of ARM System-Level Cache and GPU Side Channels., , , и . ACSAC, стр. 784-795. ACM, (2021)A Crowd-Based Explosive Detection System with Two-Level Feedback Sensor Calibration., , , , , и . ICCAD, стр. 8:1-8:9. IEEE, (2020)Covert Data Exfiltration Using Light and Power Channels., , , , и . ICCD, стр. 301-304. IEEE, (2019)Development and Implementation of a Real-Time 30-Day Readmission Predictive Model., , , , и . AMIA, AMIA, (2014)