Author of the publication

Dynamic Network Change Detection via Dynamic Network Representation Learning.

, , , and . ChinaCom (1), volume 312 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 642-658. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Software Approach to Defeating Side Channels in Last-Level Caches., , and . ACM Conference on Computer and Communications Security, page 871-882. ACM, (2016)Static Evaluation of Noninterference Using Approximate Model Counting., , , and . IEEE Symposium on Security and Privacy, page 514-528. IEEE Computer Society, (2018)Evaluating Information Leakage by Quantitative and Interpretable Measurements.. University of North Carolina, Chapel Hill, USA, (2020)base-search.net (ftcarolinadr:cdr.lib.unc.edu:jq085t27b).Dynamic Network Change Detection via Dynamic Network Representation Learning., , , and . ChinaCom (1), volume 312 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 642-658. Springer, (2019)Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud., , , , , and . OSDI, page 247-267. USENIX Association, (2023)VeriSMo: A Verified Security Module for Confidential VMs., , , , , and . OSDI, page 599-614. USENIX Association, (2024)