From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A CMOS Front-End for a Lossy Image Compression Sensor., , , , и . ISCAS, стр. 2838-2841. IEEE, (2007)Effects of charge-based computation non-idealities on CMOS image compression sensors., , , , и . ISCAS, IEEE, (2006)On Design of Single-Layer and Multilayer Code-Based Linkable Ring Signatures., , , и . IEEE Access, (2020)On Design of Blockchain-based Transport Scheme., , , и . BSCI, стр. 214-215. ACM, (2020)Towards Memory Safe Enclave Programming with Rust-SGX., , , , , , , , , и . ACM Conference on Computer and Communications Security, стр. 2333-2350. ACM, (2019)PEMU: A Pin Highly Compatible Out-of-VM Dynamic Binary Instrumentation Framework., , и . VEE, стр. 147-160. ACM, (2015)SGXElide: enabling enclave code secrecy via self-modification., , , и . CGO, стр. 75-86. ACM, (2018)Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users., , , , , , , , и . DSN, стр. 222-233. IEEE, (2019)Specularizer : Detecting Speculative Execution Attacks via Performance Tracing., , , , и . DIMVA, том 12756 из Lecture Notes in Computer Science, стр. 151-172. Springer, (2021)iTOP: Automating Counterfeit Object-Oriented Programming Attacks., , , , , и . RAID, стр. 162-176. ACM, (2021)