From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE)., , , и . IACR Cryptology ePrint Archive, (2015)ExTensor: An Accelerator for Sparse Tensor Algebra., , , , , , , и . MICRO, стр. 319-333. ACM, (2019)PyTorchFI: A Runtime Perturbation Tool for DNNs., , , , , , , и . DSN Workshops, стр. 25-31. IEEE, (2020)Constants Count: Practical Improvements to Oblivious RAM., , , , , , и . USENIX Security Symposium, стр. 415-430. USENIX Association, (2015)MicroScope: Enabling Microarchitectural Replay Attacks., , , , , и . IEEE Micro, 40 (3): 91-98 (2020)Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures., , и . USENIX Security Symposium, стр. 2003-2020. USENIX Association, (2020)Streamline: a fast, flushless cache covert-channel attack by enabling asynchronous collusion., , и . ASPLOS, стр. 1077-1090. ACM, (2021)MARC: A Many-Core Approach to Reconfigurable Computing., , , , , , , и . ReConFig, стр. 7-12. IEEE Computer Society, (2010)Generalized external interaction with tamper-resistant hardware with bounded information leakage., , , , и . CCSW, стр. 23-34. ACM, (2013)Everywhere All at Once: Co-Location Attacks on Public Cloud FaaS., , , и . ASPLOS (1), стр. 133-149. ACM, (2024)