Author of the publication

BunnyHop: Exploiting the Instruction Prefetcher.

, , , , , and . USENIX Security Symposium, page 7321-7337. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implicit-Explicit simulation of Mass-Spring-Charge Systems., , , and . CoRR, (2024)Decisions on spare parts allocation for repairable isolated system with dependent backorders., , , , and . Comput. Ind. Eng., (2019)Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks., , , , , , and . IACR Cryptol. ePrint Arch., (2024)Continuous Layout Editing of Single Images with Diffusion Models., , and . Comput. Graph. Forum, (October 2023)Multivariate Temporal Self-Attention Network for Subsurface Thermohaline Structure Reconstruction., , , , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)Memorized sparse backpropagation., , , , and . Neurocomputing, (2020)Visual Correlation Analysis of Numerical and Categorical Data on the Correlation Map., , , and . IEEE Trans. Vis. Comput. Graph., 21 (2): 289-303 (2015)Automatic Road Extraction From Remote Sensing Imagery Using Ensemble Learning and Postprocessing., , , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2021)Fast Cross Layer Authentication Scheme for Dynamic Wireless Network., , , and . WCNC, page 1-6. IEEE, (2020)Iterative cohort analysis and exploration., , and . Inf. Vis., 14 (4): 289-307 (2015)