Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards General Neural Surrogate Solvers with Specialized Neural Accelerators., , , , and . ICML, OpenReview.net, (2024)Let's Downgrade Let's Encrypt., , and . CCS, page 1421-1440. ACM, (2021)The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources., , , and . USENIX Security Symposium, page 3147-3164. USENIX Association, (2021)SMap: Internet-wide Scanning for Spoofing., and . ACSAC, page 1039-1050. ACM, (2021)SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing., , , and . AsiaCCS, ACM, (2024)Poster: Off-path VoIP Interception Attacks., , and . ICDCS, page 1-2. IEEE, (2021)Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU., , , , , and . NordSec, volume 14324 of Lecture Notes in Computer Science, page 330-349. Springer, (2023)From IP to transport and beyond: cross-layer attacks against applications., , , and . SIGCOMM, page 836-849. ACM, (2021)DNSSEC Misconfigurations in Popular Domains., , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 651-660. (2016)NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree., , , and . SP (Workshops), page 95-103. IEEE, (2024)