Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of ADHD Based on Eye Movements During Natural Viewing., , , , , , , , , and . ECML/PKDD (6), volume 13718 of Lecture Notes in Computer Science, page 403-418. Springer, (2022)Online Blind Reverberation Time Estimation Using CRNNs., , and . INTERSPEECH, page 5061-5065. ISCA, (2020)Eyettention: An Attention-based Dual-Sequence Model for Predicting Human Scanpaths during Reading., , , , , and . Proc. ACM Hum. Comput. Interact., 7 (ETRA): 1-24 (May 2023)New Predictor-Based Attacks in Processors., and . DAC, page 697-702. IEEE, (2021)A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks., , and . ASPLOS, page 683-697. ACM, (2020)ASPLOS 2020 was canceled because of COVID-19..Reading Does Not Equal Reading: Comparing, Simulating and Exploiting Reading Behavior across Populations., , , , and . LREC/COLING, page 13586-13594. ELRA and ICCL, (2024)XMSS and Embedded Systems., , , , , , and . SAC, volume 11959 of Lecture Notes in Computer Science, page 523-550. Springer, (2019)Single-Channel Blind Direct-to-Reverberation Ratio Estimation Using Masking., , and . INTERSPEECH, page 5066-5070. ISCA, (2020)TroScan: Enhancing On-Chip Delivery Resilience to Physical Attack Through Frequency-Triggered Key Generation., , , , and . DATE, page 1-6. IEEE, (2024)Evaluation of Cache Attacks on Arm Processors and Secure Caches., , , , and . CoRR, (2021)