From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Cross-Stack Approach Towards Defending Against Cryptojacking., , , и . IEEE Comput. Archit. Lett., 19 (2): 126-129 (2020)Respin: Rethinking Near-Threshold Multiprocessor Design with Non-volatile Memory., , и . IPDPS, стр. 265-275. IEEE Computer Society, (2017)Toward Mobile Malware Detection Through Convolutional Neural Networks., , и . IEEE Embed. Syst. Lett., 13 (3): 134-137 (2021)Dynamic reduction of voltage margins by leveraging on-chip ECC in Itanium II processors., и . ISCA, стр. 297-307. ACM, (2013)SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels., , , , и . PACT, стр. 151-164. IEEE, (2019)Authenticache: harnessing cache ECC for system authentication., и . MICRO, стр. 128-140. ACM, (2015)An Application Agnostic Defense Against the Dark Arts of Cryptojacking., , , и . DSN, стр. 314-325. IEEE, (2021)Adaptive parallel execution of deep neural networks on heterogeneous edge devices., , , , и . SEC, стр. 195-208. ACM, (2019)NVCool: When Non-Volatile Caches Meet Cold Boot Attacks., , , , , и . ICCD, стр. 439-448. IEEE Computer Society, (2018)RNNFast: An Accelerator for Recurrent Neural Networks Using Domain Wall Memory., , , и . CoRR, (2018)