Search for persons
X
?
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy ,
1
CloudShield: Real-time Anomaly Detection in the Cloud:
, In:
?
Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security ,
2
Speculative Execution Attacks and Hardware Defenses:
, In:
?
Workshop on Hardware and Architectural Support for Security and Privacy ,
3
Practical and Scalable Security Verification of Secure Arch..:
, In:
?
Hardware and Architectural Support for Security and Privacy ,
4
Position Paper: Consider Hardware-enhanced Defenses for Roo..:
, In:
?
Proceedings of the 35th Annual Computer Security Applications Conference ,
6
Model inversion attacks against collaborative inference:
, In:
?
Proceedings of the 2018 on Asia Conference on Computer and Communications Security ,
8
Leveraging Hardware Transactional Memory for Cache Side-Cha..:
, In:
?
Proceedings of the 34th Annual Computer Security Applications Conference ,
9
Analyzing Cache Side Channels Using Deep Neural Networks:
, In:
?
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies ,
10
Secure Pick Up : Implicit Authentication When You Start ..:
, In:
?
Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture ,
12
How secure is your cache against side-channel attacks?:
, In:
?
Proceedings of the Hardware and Architectural Support for Security and Privacy ,
13
Host-Based Dos Attacks and Defense in the Cloud:
, In:
?
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society ,
14
Blind De-anonymization Attacks using Social Networks:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
15