From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trustworthy Whole-System Provenance for the Linux Kernel., , , и . USENIX Security Symposium, стр. 319-334. USENIX Association, (2015)Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World., , , , и . USENIX Security Symposium, стр. 17-32. USENIX Association, (2015)Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST., , , , , и . EVT, USENIX Association, (2008)Analyzing the Monetization Ecosystem of Stalkerware., , , , , , , , и . Proc. Priv. Enhancing Technol., 2022 (4): 105-119 (2022)NASA: NVM-Assisted Secure Deletion for Flash Memory., и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (11): 3779-3790 (2022)ProXray: Protocol Model Learning and Guided Firmware Analysis., , , , и . IEEE Trans. Software Eng., 47 (9): 1907-1928 (2021)A Practical Methodology for ML-Based EM Side Channel Disassemblers., , , и . CoRR, (2022)Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples., , , , и . CoRR, (2021)Accountable Wiretapping -or- I know they can hear you now., , , , , и . NDSS, The Internet Society, (2012)Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs., , и . TaPP, USENIX Association, (2015)