Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Baobab Merkle Tree for Efficient Secure Memory., , , , , , , and . IEEE Comput. Archit. Lett., 23 (1): 33-36 (January 2024)A New Foe in GPUs: Power Side-Channel Attacks on Neural Network., , and . ISQED, page 313. IEEE, (2021)Analyzing behavioral changes of Twitter users after exposure to misinformation., , , , and . ASONAM, page 591-598. ACM, (2021)Analyzing Twitter Users' Behavior Before and After Contact by the Russia's Internet Research Agency., , , , , , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW1): 90:1-90:24 (2021)Analyzing Twitter Users' Behavior Before and After Contact by the Internet Research Agency., , , , , , and . CoRR, (2020)Understanding How Readers Determine the Legitimacy of Online News Articles in the Era of Fake News., , , , , and . ASONAM, page 768-775. IEEE, (2020)Eliminating Micro-Architectural Side-Channel Attacks using Near Memory Processing., , , and . SEED, page 179-189. IEEE, (2022)Design Strategies for Efficient and Secure Memory.. Duke University, Durham, NC, USA, (2019)base-search.net (ftdukeunivdsp:oai:localhost:10161/18719).SpecCheck: A Tool for Systematic Identification of Vulnerable Transient Execution in gem5., , and . PACT, page 265-278. IEEE, (2023)Do Twitter users change their behavior after exposure to misinformation? An in-depth analysis., , , , and . Soc. Netw. Anal. Min., 12 (1): 167 (2022)