From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MAD-EN: Microarchitectural Attack Detection through System-wide Energy Consumption., и . CoRR, (2022)Undermining User Privacy on Mobile Devices Using AI., , , , , и . CoRR, (2018)XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses.. IEEE Trans. Dependable Secur. Comput., 19 (6): 4039-4051 (2022)SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks., , , , , , и . USENIX Security Symposium, стр. 621-637. USENIX Association, (2019)A Faster and More Realistic Flush+Reload Attack on AES., , , , и . COSADE, том 9064 из Lecture Notes in Computer Science, стр. 111-126. Springer, (2015)Co-location Detection on the Cloud., , , и . COSADE, том 9689 из Lecture Notes in Computer Science, стр. 19-34. Springer, (2016)Undermining User Privacy on Mobile Devices Using AI., , , , , и . AsiaCCS, стр. 214-227. ACM, (2019)Cross-VM Cache Attacks on AES., , , , и . IEEE Trans. Multi Scale Comput. Syst., 2 (3): 211-222 (2016)FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning., , , и . CoRR, (2019)PerfWeb: How to Violate Web Privacy with Hardware Performance Events., , , и . ESORICS (2), том 10493 из Lecture Notes in Computer Science, стр. 80-97. Springer, (2017)