Author of the publication

PrivateEye: Scalable and Privacy-Preserving Compromise Detection in the Cloud.

, , , , , , and . NSDI, page 797-815. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Measurement Study of Peer-to-Peer File Sharing Systems, , and . Proceedings of the Multimedia Computing and Networking Conference, (January 2002)Measurement, modeling, and analysis of a peer-to-peer file-sharing workload, , , , , and . SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, page 314--329. New York, NY, USA, ACM, (2003)Measuring and analyzing the characteristics of Napster and Gnutella hosts, , and . Multimedia Syst., 9 (2): 170--184 (2003)"My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing., , , , , , , and . Proc. Priv. Enhancing Technol., 2023 (3): 252-267 (July 2023)Volley: Automated Data Placement for Geo-Distributed Cloud Services., , , , and . NSDI, page 17-32. USENIX Association, (2010)MOESI-prime: preventing coherence-induced hammering in commodity workloads., , , , and . ISCA, page 670-684. ACM, (2022)Stop! Hammer time: rethinking our approach to rowhammer mitigations., , , and . HotOS, page 88-95. ACM, (2021)Finding Content in File-Sharing Networks When You Can't Even Spell., , , and . IPTPS, (2007)A Measurement Study of Peer-to-Peer File Sharing Systems, , and . Proceedings of Multimedia Computing and Networking 2002 (MMCN '02), San Jose, CA, USA, (January 2002)BlueMonarch: a system for evaluating bluetooth applications in the wild., , and . MobiSys, page 41-54. ACM, (2009)