Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards the Universal Defense for Query-Based Audio Adversarial Attacks., , , and . CoRR, (2023)AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection., , , , and . CoRR, (2023)Instruction Cache Locking Using Temporal Reuse Profile., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 34 (9): 1387-1400 (2015)Adaptive Task-Based Intermittent Computing System With Parallel State Backup., , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (6): 1798-1809 (June 2023)Towards the universal defense for query-based audio adversarial attacks on speech recognition system., , , and . Cybersecur., 6 (1): 40 (December 2023)coxHE: A software-hardware co-design framework for FPGA acceleration of homomorphic computation., , , , , and . DATE, page 1353-1358. IEEE, (2022)Cooperative DVFS for energy-efficient HEVC decoding on embedded CPU-GPU architecture., , , , and . DAC, page 42:1-42:6. ACM, (2017)Maximizing Forward Progress with Cache-aware Backup for Self-powered Non-volatile Processors., , , , and . DAC, page 2:1-2:6. ACM, (2017)Shared last-level cache management for GPGPUs with hybrid main memory., , , , , and . DATE, page 25-30. IEEE, (2017)Performance debugging of Esterel specifications., , , and . CODES+ISSS, page 173-178. ACM, (2008)