From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Threats in Cloud Rooted from Machine Learning-Based Resource Provisioning Systems., , , и . SVCC, том 1536 из Communications in Computer and Information Science, стр. 22-32. Springer, (2021)LLM-FIN: Large Language Models Fingerprinting Attack on Edge Devices., , , , , , , , , и . ISQED, стр. 1-6. IEEE, (2024)SpecScope: Automating Discovery of Exploitable Spectre Gadgets on Black-Box Microarchitectures., , , , , , , и . DATE, стр. 1-6. IEEE, (2024)Automated Hardware Logic Obfuscation Framework Using GPT., , , , , , , и . CoRR, (2024)Securing On-Chip Learning: Navigating Vulnerabilities and Potential Safeguards in Spiking Neural Network Architectures., , , , , , , , и . ISCAS, стр. 1-5. IEEE, (2024)Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks., , , , , , , и . NDSS, The Internet Society, (2022)Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud., , , , , , и . SEED, стр. 1-13. IEEE, (2021)ELC-ECG: Efficient LSTM Cell for ECG Classification Based on Quantized Architecture., , , , , и . ISCAS, стр. 1-5. IEEE, (2021)Large Language Models for Code Analysis: Do LLMs Really Do Their Job?, , , , , , , , , и 1 other автор(ы). CoRR, (2023)Multi-level Binarized LSTM in EEG Classification for Wearable Devices., , , , и . PDP, стр. 175-181. IEEE, (2020)