Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cross-Stack Approach Towards Defending Against Cryptojacking., , , and . IEEE Comput. Archit. Lett., 19 (2): 126-129 (2020)Respin: Rethinking Near-Threshold Multiprocessor Design with Non-volatile Memory., , and . IPDPS, page 265-275. IEEE Computer Society, (2017)Toward Mobile Malware Detection Through Convolutional Neural Networks., , and . IEEE Embed. Syst. Lett., 13 (3): 134-137 (2021)Dynamic reduction of voltage margins by leveraging on-chip ECC in Itanium II processors., and . ISCA, page 297-307. ACM, (2013)SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels., , , , and . PACT, page 151-164. IEEE, (2019)An Application Agnostic Defense Against the Dark Arts of Cryptojacking., , , and . DSN, page 314-325. IEEE, (2021)Authenticache: harnessing cache ECC for system authentication., and . MICRO, page 128-140. ACM, (2015)Adaptive parallel execution of deep neural networks on heterogeneous edge devices., , , , and . SEC, page 195-208. ACM, (2019)NVCool: When Non-Volatile Caches Meet Cold Boot Attacks., , , , , and . ICCD, page 439-448. IEEE Computer Society, (2018)RNNFast: An Accelerator for Recurrent Neural Networks Using Domain Wall Memory., , , and . CoRR, (2018)