Author of the publication

PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter.

, , , , , , , , and . DATE, page 1697-1702. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Cooperative Storage Management Framework for Big Data in Satellite Network Operation and Maintenance., , and . SINC, volume 803 of Communications in Computer and Information Science, page 93-104. Springer, (2017)Auditing Revenue Assurance Information Systems for Telecom Operators., , , and . CONFENIS (2), volume 255 of IFIP, page 1597-1602. Springer, (2007)Weakly supervised 3D classification of chest CT using aggregated multi-resolution deep segmentation features., , , , , , , and . Medical Imaging: Computer-Aided Diagnosis, volume 11314 of SPIE Proceedings, SPIE, (2020)TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU., , , , , and . HPCA, page 922-934. IEEE, (2023)Identifying Medical Diagnoses and Treatable Diseases by Image-Based Deep Learning, , , , , , , , , and 29 other author(s). Cell, 172 (5): 1122--1131.e9 (February 2018)Mitigating Cross-Core Cache Attacks via Suspicious Traffic Detection., , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (2): 347-358 (2021)Game-Theory-Based Clustering Scheme for Energy Balancing in Underwater Acoustic Sensor Networks., , , , , , and . IEEE Internet Things J., 8 (11): 9005-9013 (2021)Research on infrared image enhancement and segmentation of power equipment based on partial differential equation., , , , , and . J. Vis. Commun. Image Represent., (2019)Analysis and research on network security and privacy security in ubiquitous electricity Internet of Things., , , , , and . Comput. Commun., (2020)Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor., , , , , , , , and . IEEE Trans. Computers, 69 (11): 1571-1583 (2020)