From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Hardware Malware Detectors That are Resilient to Adversarial Evasion., , , , и . IEEE Trans. Computers, 71 (11): 2872-2887 (2022)Adversarial Attacks Against Machine Learning-Based Resource Provisioning Systems., , , , , , , и . IEEE Micro, 43 (5): 35-44 (сентября 2023)Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud., , , , , , и . SEED, стр. 1-13. IEEE, (2021)Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks., , , , , , , и . NDSS, The Internet Society, (2022)Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks., , и . ICCAD, стр. 1-9. IEEE, (2021)Evolution of Defenses against Transient-Execution Attacks., , , и . ACM Great Lakes Symposium on VLSI, стр. 169-174. ACM, (2020)SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation., , , , и . CoRR, (2019)Evasive Hardware Trojan through Adversarial Power Trace., , и . CoRR, (2024)Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks., , , , , , и . CoRR, (2022)Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling., , и . CoRR, (2021)