Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Besting the Black-Box: Barrier Zones for Adversarial Example Defense., , , , and . IEEE Access, (2022)A Retrospective on Path ORAM., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (8): 1572-1576 (2020)Path ORAM: An Extremely Simple Oblivious RAM Protocol., , , , , , , and . J. ACM, 65 (4): 18:1-18:26 (2018)Splitting the Interpose PUF: A Novel Modeling Attack Strategy., , , , , , , and . IACR Cryptology ePrint Archive, (2019)Leveraging Hardware Isolation for Process Level Access Control & Authentication., , , , and . SACMAT, page 133-141. ACM, (2017)Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise., , , , , and . CoRR, (2020)Analysis of the Sensitivity Attack against Electronic Watermarks in Images., and . Information Hiding, volume 1525 of Lecture Notes in Computer Science, page 258-272. Springer, (1998)Mitigating Synchronized Hardware Trojan Attacks in Smart Grids., , , , and . SPSR-SG@CPSWeek, page 35-40. ACM, (2017)Design and Implementation of the Ascend Secure Processor., , , , and . IEEE Trans. Dependable Secur. Comput., 16 (2): 204-216 (2019)Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory., , , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 436-442 (2020)