From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Query-Efficient and Imperceptible Attacks on Multivariate Time Series DNN Models., , , , и . IFIP Networking, стр. 1-9. IEEE, (2022)Hybrid Digital-Digital In-Memory Computing., , , и . DATE, стр. 1177-1180. IEEE, (2022)PAC-Learning for Strategic Classification., , , и . ICML, том 139 из Proceedings of Machine Learning Research, стр. 9978-9988. PMLR, (2021)Are Coherence Protocol States Vulnerable to Information Leakage?, , и . HPCA, стр. 168-179. IEEE Computer Society, (2018)Augmenting Graphs to Minimize the Radius., , и . ISAAC, том 212 из LIPIcs, стр. 45:1-45:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)PowSpectre: Powering Up Speculation Attacks with TSX-based Replay., , и . AsiaCCS, ACM, (2024)MetaLeak: Uncovering Side Channels in Secure Processor Architectures Exploiting Metadata., , и . ISCA, стр. 693-707. IEEE, (2024)SIMBER: Eliminating Redundant Memory Bound Checks via Statistical Inference., , , , , и . SEC, том 502 из IFIP Advances in Information and Communication Technology, стр. 413-426. Springer, (2017)VITA: ViT Acceleration for Efficient 3D Human Mesh Recovery via Hardware-Algorithm Co-Design., , , , , , и . DAC, стр. 274:1-274:6. ACM, (2024)Learning from Imperfect Human Feedback: a Tale from Corruption-Robust Dueling., , , и . CoRR, (2024)