Author of the publication

A Two-Stage Out-Of-Box Method for Detecting Side-Channel Attacks in Cloud Computing.

, , , and . CSP, page 148-153. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Competence-Based Three-Layer Cybersecurity Education Framework and Its Application., , , and . ACM TUR-C, page 54-60. ACM, (2021)A Model of Dynamic Malware Analysis Based on VMI., , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 465-475. Springer, (2015)Defending against Poisoning Attacks in Federated Learning from a Spatial-temporal Perspective., , , and . SRDS, page 25-34. IEEE, (2023)Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures., , , and . ICICS, volume 8233 of Lecture Notes in Computer Science, page 100-112. Springer, (2013)Speedy Privacy-Preserving Skyline Queries on Outsourced Data., , , , , , and . ESORICS (2), volume 14983 of Lecture Notes in Computer Science, page 430-450. Springer, (2024)Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning., , , and . ICCNS, page 74-78. ACM, (2018)A Disjunctive VMI Model Based on XSM., , and . SmartCity, page 921-925. IEEE Computer Society, (2015)A Two-Stage Out-Of-Box Method for Detecting Side-Channel Attacks in Cloud Computing., , , and . CSP, page 148-153. IEEE, (2022)Feedback based Sampling for Intrusion Detection in Software Defined Network., , , and . ICCSP, page 95-99. ACM, (2018)Defending against Adversarial Attacks in Federated Learning on Metric Learning Model., , , and . TrustCom, page 197-206. IEEE, (2023)