Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Barista: An Event-centric NOS Composition Framework for Software-Defined Networks., , , , , and . INFOCOM, page 980-988. IEEE, (2018)Towards Building Secure and Reconfigurable Virtual Networks on Multi-Tenant Data Centers., and . PRDC, page 248-251. IEEE, (2022)HELIOS: Hardware-assisted High-performance Security Extension for Cloud Networking., , , and . SoCC, page 486-501. ACM, (2023)Scaling the Performance of Network Intrusion Detection with Many-core Processors., , , , and . ANCS, page 191-192. IEEE Computer Society, (2015)NOSArmor: Building a Secure Network Operating System., , and . Secur. Commun. Networks, (2018)Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities., , , and . ACM Conference on Computer and Communications Security, page 2665-2667. ACM, (2019)Optimized Feature Generation for Tabular Data via LLMs with Decision Tree Reasoning., , , , , and . CoRR, (2024)Ambusher: Exploring the Security of Distributed SDN Controllers Through Protocol State Fuzzing., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)STUNT: Few-shot Tabular Learning with Self-generated Tasks from Unlabeled Tables., , , , and . ICLR, OpenReview.net, (2023)Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPI., , , , and . ACSAC, page 620-633. ACM, (2021)