From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices., , , , , , , и . CoRR, (2022)PPMCK: Privacy-preserving multi-party computing for K-means clustering., , , , , , , и . J. Parallel Distributed Comput., (2021)CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis., , , , , , и . IET Inf. Secur., 17 (4): 582-597 (июля 2023)Ilea: inter-language analysis across java and c., и . OOPSLA, стр. 39-56. ACM, (2007)Performant Binary Fuzzing without Source Code using Static Instrumentation., , , и . CNS, стр. 226-235. IEEE, (2022)Ghost Thread: Effective User-Space Cache Side Channel Protection., , , и . CODASPY, стр. 233-244. ACM, (2021)BinPointer: towards precise, sound, and scalable binary-level pointer analysis., , , и . CC, стр. 169-180. ACM, (2022)MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies., , и . TrustCom, стр. 810-821. IEEE, (2021)Fairness-aware Configuration of Machine Learning Libraries., , , и . ICSE, стр. 909-920. ACM, (2022)Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP., , , , , и . CCS, стр. 1803-1820. ACM, (2020)