Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Memorability of System-generated PINs: Can Chunking Help?, , , , and . SOUPS, page 197-209. USENIX Association, (2015)Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks., , , and . Canadian AI, volume 12109 of Lecture Notes in Computer Science, page 1-14. Springer, (2020)Towards SDN enabled network control delegation in clouds., , , , and . DSN, page 1-6. IEEE Computer Society, (2013)A Novel Scheduling Framework Leveraging Hardware Cache Partitioning for Cache-Side-Channel Elimination in Clouds., , , , , and . CoRR, (2017)Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption., , , , , , , and . NDSS, The Internet Society, (2019)Malicious data detection in state estimation leveraging system losses & estimation of perturbed parameters., , , and . SmartGridComm, page 402-407. IEEE, (2013)Formal Analysis of Fault-tolerant Group Key Management Using ZooKeeper., , and . CCGRID, page 636-641. IEEE Computer Society, (2013)CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and PrivaCy., and . CCS, page 2629-2630. ACM, (2017)Inter-flow consistency: A novel SDN update abstraction for supporting inter-flow constraints., , , and . CNS, page 469-478. IEEE, (2015)Scheduling, Isolation, and Cache Allocation: A Side-Channel Defense., , , , , and . IC2E, page 34-40. IEEE Computer Society, (2018)