Author of the publication

Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines.

, , , , , and . Frontiers Inf. Technol. Electron. Eng., 20 (5): 731-748 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A method of function modeling in accurate stub generation., , , and . ICSAI, page 1022-1026. IEEE, (2014)Optimized Branch and Bound for Path-wise Test Data Generation., , , and . Int. J. Comput. Commun. Control, 9 (4): 497-509 (2014)Domain-RIP Analysis: A Technique for Analyzing Mutation Stubbornness., , , and . IEEE Access, (2019)Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines., , , , , and . Frontiers Inf. Technol. Electron. Eng., 20 (5): 731-748 (2019)Dynamic Event-Triggered Antidisturbance Control for Flexible Spacecraft Systems., , and . IEEE Trans. Aerosp. Electron. Syst., 58 (6): 5766-5783 (2022)Pocket: Elastic Ephemeral Storage for Serverless Analytics., , , , , and . login Usenix Mag., (2019)MobileNetV3 with CBAM for Bamboo Stick Counting.. (April 2022)An Application of Interval Analysis in Software Static Analysis., , , , and . EUC (2), page 367-372. IEEE Computer Society, (2008)978-0-7695-3492-3.Subsuming mutation operators., , and . ICSE (Companion Volume), page 236-237. ACM, (2018)Fast and scale-adaptive target tracking via keypoint matching., , , and . ICDIP, volume 9631 of SPIE Proceedings, page 96311M. SPIE, (2015)