From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatic Uncovering of Tap Points from Kernel Executions., , и . RAID, том 9854 из Lecture Notes in Computer Science, стр. 49-70. Springer, (2016)Preventing Cryptographic Key Leakage in Cloud Virtual Machines., , , и . USENIX Security Symposium, стр. 703-718. USENIX Association, (2014)A CMOS image sensor for focal plane decomposition., , , , и . ISCAS (5), стр. 5322-5325. IEEE, (2005)A Method of Human Skin Region Detection Based on PCNN., , , и . ISNN (3), том 5553 из Lecture Notes in Computer Science, стр. 486-493. Springer, (2009)Characterizing kernel malware behavior with kernel data access patterns., , и . AsiaCCS, стр. 207-216. ACM, (2011)Distribution Properties and 2-Adic Complexity of Clock-Controlled FCSR Sequences., и . 3PGCIC, стр. 386-389. IEEE Computer Society, (2014)SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution., , , , , и . EuroS&P, стр. 142-157. IEEE, (2019)EXTERIOR: using a dual-VM based external shell for guest-OS introspection, configuration, and recovery., и . VEE, стр. 97-110. ACM, (2013)Efficient Explicit Constructions of Multipartite Secret Sharing Schemes., , и . ASIACRYPT (2), том 11922 из Lecture Notes in Computer Science, стр. 505-536. Springer, (2019)BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering., , , , , и . AsiaCCS, стр. 393-398. ACM, (2018)