Author of the publication

A Coprocessor-Based Introspection Framework Via Intel Management Engine.

, , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (4): 1920-1932 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Transparent Debugging., , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 321-335 (2018)Calibration of DEM models for fertilizer particles based on numerical simulations and granular experiments., , , , and . Comput. Electron. Agric., (2023)A Framework to Secure Peripherals at Runtime., , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 219-238. Springer, (2014)Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices., , , , , and . IEEE Internet Things J., 9 (12): 10093-10107 (2022)STC-IDS: Spatial-Temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles., , and . CoRR, (2022)User-friendly deniable storage for mobile devices., , , , , , and . Comput. Secur., (2018)Syntactic Ghost: An Imperceptible General-purpose Backdoor Attacks on Pre-trained Language Models., , , , , and . CoRR, (2024)Corrections to "Hardware-Assisted Transparent Tracing and Debugging on ARM"., and . IEEE Trans. Inf. Forensics Secur., (2021)Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels., , , and . IEEE Trans. Inf. Forensics Secur., 13 (6): 1535-1550 (2018)An Attribute-Isolated Secure Communication Architecture for Intelligent Connected Vehicles., , , and . IEEE Trans. Intell. Veh., 5 (4): 545-555 (2020)