Author of the publication

NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems.

, , , , , and . USENIX Security Symposium, page 6771-6788. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Better Features for Face Detection with Feature Fusion and Segmentation Supervision., , , , , and . CoRR, (2018)An Interpretable Power System Transient Stability Assessment Method with Expert Guiding Neural-Regression-Tree., , , , and . CoRR, (2024)Optimization of the Ecological Network Structure Based on Scenario Simulation and Trade-Offs/Synergies among Ecosystem Services in Nanping., , , , and . Remote. Sens., 14 (20): 5245 (2022)Verdi: Quality Estimation and Error Detection for Bilingual., , , , and . CoRR, (2021)NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems., , , , , and . USENIX Security Symposium, page 6771-6788. USENIX Association, (2023)GroupDancer: Music to Multi-People Dance Synthesis with Style Collaboration., , , , , , , and . ACM Multimedia, page 1138-1146. ACM, (2022)Cyber-Physical System Enabled Path Planning Simulation for Collaborative Industrial Robots., , and . CSCWD, page 711-716. IEEE, (2022)TAGER: Transition-Labeled Graph Edit Distance Similarity Measure on Process Models., , , and . OTM Conferences, volume 8841 of Lecture Notes in Computer Science, page 184-201. Springer, (2014)Non-singular Finite-Time Consensus Tracking Protocols for Second-Order Multi-agent Systems., , , , and . ICSI (2), volume 12690 of Lecture Notes in Computer Science, page 182-192. Springer, (2021)Leveraging Large Language Models for Analysis of Student Course Feedback., , , and . COMPUTE, page 76-79. ACM, (2023)