Author of the publication

PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud.

, , , , , , and . NSDI, page 797-815. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing., , , , , , , and . Proc. Priv. Enhancing Technol., 2023 (3): 252-267 (July 2023)A Measurement Study of Peer-to-Peer File Sharing Systems, , and . Proceedings of the Multimedia Computing and Networking Conference, (January 2002)Measurement, modeling, and analysis of a peer-to-peer file-sharing workload, , , , , and . SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, page 314--329. New York, NY, USA, ACM, (2003)Measuring and analyzing the characteristics of Napster and Gnutella hosts, , and . Multimedia Syst., 9 (2): 170--184 (2003)Volley: Automated Data Placement for Geo-Distributed Cloud Services., , , , and . NSDI, page 17-32. USENIX Association, (2010)MOESI-prime: preventing coherence-induced hammering in commodity workloads., , , , and . ISCA, page 670-684. ACM, (2022)Stop! Hammer time: rethinking our approach to rowhammer mitigations., , , and . HotOS, page 88-95. ACM, (2021)Finding Content in File-Sharing Networks When You Can't Even Spell., , , and . IPTPS, (2007)A Measurement Study of Peer-to-Peer File Sharing Systems, , and . Multimedia Computing and Networking (MMCN), (January 2002)5th international workshop on networking meets databases (NetDB 2009)., and . ACM SIGOPS Oper. Syst. Rev., 43 (4): 17-18 (2009)