Author of the publication

Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks.

, , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (3): 224-248 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring the Vulnerability of Deep Neural Networks: A Study of Parameter Corruption., , , , and . AAAI, page 11648-11656. AAAI Press, (2021)Sibyl: Host Load Prediction with an Efficient Deep Learning Model in Cloud Computing., , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 226-237. Springer, (2018)An efficient angle-based shape matching approach towards object recognition., , , and . ICME, page 1-5. IEEE Computer Society, (2011)Balanced layouts using the composite data-variable matrix., , , and . IEEE VAST, page 235-236. IEEE Computer Society, (2014)Improved spin images for 3D surface matching using signed angles., , and . ICIP, page 537-540. IEEE, (2012)Efficient 3D dental identification via signed feature histogram and learning keypoint detection., , , and . Pattern Recognit., (2016)Attention-based Sentiment Reasoner for aspect-based sentiment analysis., , , , and . Hum. centric Comput. Inf. Sci., (2019)Test-Time Augmentation for 3D Point Cloud Classification and Segmentation., , , , and . CoRR, (2023)Memorized Sparse Backpropagation., , , and . CoRR, (2019)Stock Trading Volume Prediction with Dual-Process Meta-Learning., , , , , and . ECML/PKDD (6), volume 13718 of Lecture Notes in Computer Science, page 137-153. Springer, (2022)