Author of the publication

Efficient Hardware Malware Detectors That are Resilient to Adversarial Evasion.

, , , , and . IEEE Trans. Computers, 71 (11): 2872-2887 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EA-PLRU: Enclave-Aware Cache Replacement., , , and . HASP@ISCA, page 5:1-5:8. ACM, (2019)A co-processor approach for accelerating data-structure intensive algorithms., , , and . ICCD, page 431-438. IEEE Computer Society, (2010)Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications., , , , , and . IEEE Trans. Dependable Secur. Comput., 15 (3): 437-451 (2018)Reducing power requirements of instruction scheduling through dynamic allocation of multiple datapath resources., , and . MICRO, page 90-101. ACM/IEEE Computer Society, (2001)Energy-Efficient Design of the Reorder Buffer., , and . PATMOS, volume 2451 of Lecture Notes in Computer Science, page 289-299. Springer, (2002)New Architecture and Protocols for Global-Scale Machine Communities., , and . CAINE, page 118-123. ISCA, (2008)Energy Efficient Register Renaming., , , and . PATMOS, volume 2799 of Lecture Notes in Computer Science, page 219-228. Springer, (2003)Can PDES scale in environments with heterogeneous delays?, , , and . SIGSIM-PADS, page 35-46. ACM, (2013)Reducing Delay and Power Consumption of the Wakeup Logic Through Instruction Packing and Tag Memoization., , , and . PACS, volume 3471 of Lecture Notes in Computer Science, page 15-29. Springer, (2004)Metrized Small World Properties Based Data Structure., , , and . SEDE, page 203-208. ISCA, (2008)