From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dynamic reduction of voltage margins by leveraging on-chip ECC in Itanium II processors., и . ISCA, стр. 297-307. ACM, (2013)Respin: Rethinking Near-Threshold Multiprocessor Design with Non-volatile Memory., , и . IPDPS, стр. 265-275. IEEE Computer Society, (2017)Sniper: Countering Locker Ransomware Attacks Through Natural Language Processing., , и . IEEE Trans. Dependable Secur. Comput., 22 (4): 4160-4175 (июля 2025)Dark Firmware: A Systematic Approach to Exploring Application Security Risks in the Presence of Untrusted Firmware., , , , и . RAID, стр. 413-426. USENIX Association, (2020)Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses., , , , , и . IEEE Access, (2021)RNNFast: An Accelerator for Recurrent Neural Networks Using Domain Wall Memory., , , и . CoRR, (2018)Isolating Speculative Data to Prevent Transient Execution Attacks., , , , и . IEEE Comput. Archit. Lett., 18 (2): 178-181 (2019)Using ECC Feedback to Guide Voltage Speculation in Low-Voltage Processors., и . MICRO, стр. 306-318. IEEE Computer Society, (2014)Seamlessly Safeguarding Data Against Ransomware Attacks., , , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (1): 1-16 (2023)RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware., , , и . ACM Trans. Priv. Secur., 26 (3): 27:1-27:30 (августа 2023)