Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust and Protection in the Illinois Browser Operating System., , and . OSDI, page 17-32. USENIX Association, (2010)Trends and Progress in Nuclear and Hadron Physics: a straight or winding road, , , , , , , , , and 1 other author(s). (Dec 12, 2016)Fortifying web-based applications automatically., , and . ACM Conference on Computer and Communications Security, page 615-626. ACM, (2011)Optimal Design of Self-Shielded Biplanar Coil Assembly With Miniaturized Structure., , , , , , and . IEEE Trans. Instrum. Meas., (2023)Self-Alignment of Large Language Models via Monopolylogue-based Social Scene Simulation., , , , , , and . CoRR, (2024)Performance Evaluations of Noisy Approximate Quantum Fourier Arithmetic., , , , , , , and . IPDPS Workshops, page 435-444. IEEE, (2022)Unrolled Graph Learning for Multi-Agent Collaboration., , , , and . CoRR, (2022)Towards secure web browsing. University of Illinois Urbana-Champaign, USA, (2011)Starrypia: An AR Gamified Music Adjuvant Treatment Application for Children with Autism Based on Combined Therapy., , , , , and . UIST, page 41:1-41:16. ACM, (2023)On Parametric Misspecified Bayesian Cramér-Rao Bound: An Application to Linear/Gaussian Systems., , , and . ICASSP, page 1-5. IEEE, (2023)