Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Splitting the Interpose PUF: A Novel Modeling Attack Strategy., , , , , , , and . IACR Cryptology ePrint Archive, (2019)Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD., , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 6392-6400. PMLR, (2019)Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise., , , , , and . CoRR, (2020)Besting the Black-Box: Barrier Zones for Adversarial Example Defense., , , , and . IEEE Access, (2022)Finite-Sum Optimization: A New Perspective for Convergence to a Global Solution., , and . CoRR, (2022)Optimal Finite-Sum Smooth Non-Convex Optimization with SARAH., , , , , and . CoRR, (2019)A Retrospective on Path ORAM., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (8): 1572-1576 (2020)Design and Implementation of the Ascend Secure Processor., , , , and . IEEE Trans. Dependable Secur. Comput., 16 (2): 204-216 (2019)Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory., , , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 436-442 (2020)Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak., , , , and . IACR Cryptol. ePrint Arch., (2021)