Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MEGATRON: Software-Managed Device TLB for Shared-Memory FPGA Virtualization., , , , , and . DAC, page 1213-1218. IEEE, (2021)Adversarial Example Does Good: Preventing Painting Imitation from Diffusion Models via Adversarial Examples., , , , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 20763-20786. PMLR, (2023)POSTER: Recovering Performance for Vector-based Machine Learning on Managed Runtime., , , and . PPoPP, page 457-458. ACM, (2017)Optimizing Virtual Resource Management for Consolidated NUMA Systems., , , and . ICCD, page 573-576. IEEE Computer Society, (2018)Fast Viterbi map matching with tunable weight functions., , , , and . SIGSPATIAL/GIS, page 613-616. ACM, (2012)ES2: Aiming at an Optimal Virtual I/O Event Path., , , , , and . ICPP, page 141-150. IEEE Computer Society, (2017)HybridPass: Hybrid Scheduling for Mixed Flows in Datacenter Networks., , , and . IPDPS, page 1000-1009. IEEE Computer Society, (2018)FedCP: Separating Feature Information for Personalized Federated Learning via Conditional Policy., , , , , , and . KDD, page 3249-3261. ACM, (2023)vTZ: Virtualizing ARM TrustZone., , , , , and . USENIX Security Symposium, page 541-556. USENIX Association, (2017)(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization., , , , and . USENIX Security Symposium, page 1695-1712. USENIX Association, (2020)