Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy enhanced access control in pervasive computing environments., and . BROADNETS, page 384-396. IEEE, (2005)Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization., , , , , , , , , and 1 other author(s). CCS, page 764-778. ACM, (2021)Inverse Transport and Diffusion Problems in Photoacoustic Imaging with Nonlinear Absorption., , and . SIAM J. Appl. Math., 82 (2): 602-624 (2022)CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 912-923 (2022)You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center., , , , , and . IEEE Trans. Dependable Secur. Comput., 17 (6): 1218-1231 (2020)Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (3): 608-619 (2020)Learn to Forget: Machine Unlearning via Neuron Masking., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3194-3207 (July 2023)A range characterization of the single-quadrant ADRT., , and . Math. Comput., 92 (339): 283-306 (September 2022)A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices., , , , , , , and . CoRR, (2021)Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems., , , , , and . ACM Comput. Surv., 55 (7): 134:1-134:36 (2023)