From post

Sidebuster: automated detection and quantification of side-channel leaks in web application development.

, , , , и . ACM Conference on Computer and Communications Security, стр. 595-606. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

11.1 A 512Gb 3b/cell flash memory on 64-word-line-layer BiCS technology., , , , , , , , , и 47 other автор(ы). ISSCC, стр. 196-197. IEEE, (2017)The China-Brain Project: Building China's Artificial Brain Using an Evolved Neural Net Module Approach., , , , , , , , , и 4 other автор(ы). AGI, том 171 из Frontiers in Artificial Intelligence and Applications, стр. 107-121. IOS Press, (2008)Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics., , , и . SEC, том 147 из IFIP, стр. 83-100. Kluwer / Springer, (2004)Estimating large covariance matrix with network topology for high-dimensional biomedical data., , , , и . Comput. Stat. Data Anal., (2018)High-dimension to high-dimension screening for detecting genome-wide epigenetic and noncoding RNA regulators of gene expression., , , , , , и . Bioinform., 38 (17): 4078-4087 (2022)3D hemisphere-based convolutional neural network for whole-brain MRI segmentation., , , , , , , , и . Comput. Medical Imaging Graph., (2022)Reinforcement Learning for QoS-Constrained Autonomous Resource Allocation with H2H/M2M Co-Existence in Cellular Networks., , , и . IEICE Trans. Commun., 105-B (11): 1332-1341 (ноября 2022)Understanding and Improving In-Context Learning on Vision-language Models., , , , , , и . CoRR, (2023)A Flexible Privacy-preserving Framework for Singular Value Decomposition under Internet of Things Environment., , и . CoRR, (2017)Distribution Shift Matters for Knowledge Distillation with Webly Collected Images., , , , и . ICCV, стр. 17424-17434. IEEE, (2023)