From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A heuristic approach to author name disambiguation in bibliometrics databases for large-scale research assessments., , и . J. Assoc. Inf. Sci. Technol., 62 (2): 257-269 (2011)Don't Look UB: Exposing Sanitizer-Eliding Compiler Optimizations., , , , и . Proc. ACM Program. Lang., 7 (PLDI): 907-927 (2023)Slick: an intrusion detection system for virtualized storage devices., , , и . SAC, стр. 2033-2040. ACM, (2016)I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics., , , и . DIMVA, том 8550 из Lecture Notes in Computer Science, стр. 92-111. Springer, (2014)No Need to Hide: Protecting Safe Regions on Commodity Hardware., , , , и . EuroSys, стр. 437-452. ACM, (2017)Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel., , , , и . NDSS, The Internet Society, (2022)Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks., , , , и . USENIX Security Symposium, стр. 971-988. USENIX Association, (2022)Poking Holes in Information Hiding., , , и . USENIX Security Symposium, стр. 121-138. USENIX Association, (2016)Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks., , , , и . USENIX Security Symposium, стр. 497-514. USENIX Association, (2019)Uncontained: Uncovering Container Confusion in the Linux Kernel., , , , и . USENIX Security Symposium, стр. 5055-5072. USENIX Association, (2023)