Author of the publication

LeakageFreeSpec: Applying the Wiping Approach to Defend Against Transient Execution Attacks.

, , , and . CF, ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Global Inferior-Elimination Thermodynamics Selection Strategy for Evolutionary Algorithm., , and . ISNN (1), volume 6063 of Lecture Notes in Computer Science, page 272-279. Springer, (2010)Research and Practice of Value-added Assessment for Cultivating Cybersecurity Talents in Higher Vocational Colleges., and . ICAIE, page 768-773. ACM, (2024)LeakageFreeSpec: Applying the Wiping Approach to Defend Against Transient Execution Attacks., , , and . CF, ACM, (2024)Estimation of distribution algorithms based on increment clustering for multiple optima in dynamic environments., , , , , and . Int. J. Comput. Sci. Eng., 19 (4): 581-589 (2019)An Improved Thermodynamics Evolutionary Algorithm Based on the Minimal Free Energy., , and . ICSI (1), volume 6145 of Lecture Notes in Computer Science, page 541-548. Springer, (2010)Improved RFID Anti-Collision Algorithm Based on Quad-Tree., , , and . CSE/EUC (1), page 171-175. IEEE Computer Society, (2017)Design of Bean Pumping Units Based on Multi-objective Optimal Evolutionary Algorithm., , and . ICNC (5), page 605-608. IEEE Computer Society, (2007)The ctenophore genome and the evolutionary origins of neural systems Open., , , , , , , , , and 26 other author(s). Nat., 510 (7503): 109-114 (2014)Privacy preservation based on clustering perturbation algorithm for social network., , , , , and . Multimedia Tools Appl., 77 (9): 11241-11258 (2018)A Novel Adaptive Resampling Particle Filtering Algorithm., , , and . CSE/EUC (1), page 297-300. IEEE Computer Society, (2017)