|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 218 occurrences of 206 keywords
|
|
|
Results
Found 577 publication records. Showing 577 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
101 | Vladimír Guzma, Pekka Jääskeläinen, Pertti Kellomäki, Jarmo Takala |
Impact of Software Bypassing on Instruction Level Parallelism and Register File Traffic. |
SAMOS |
2008 |
DBLP DOI BibTeX RDF |
|
91 | Chua-Chin Wang, Gang-Neng Sung |
Low-Power Multiplier Design Using a Bypassing Technique. |
J. Signal Process. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Low power multiplier, Timing control, Partial product, Bypassing |
89 | Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, Alexandru Nicolau |
Operation tables for scheduling in the presence of incomplete bypassing. |
CODES+ISSS |
2004 |
DBLP DOI BibTeX RDF |
hazard detection, operation table, reservation table, scheduling, retargetable compilers, bypass |
79 | Ömer Erdem Demir, Premkumar T. Devanbu, Eric Wohlstadter, Stefan Tai |
An aspect-oriented approach to bypassing middleware layers. |
AOSD |
2007 |
DBLP DOI BibTeX RDF |
aspect oriented bypassing, middleware, cross-layer, model-driven |
71 | Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, Alexandru Nicolau |
Retargetable pipeline hazard detection for partially bypassed processors. |
IEEE Trans. Very Large Scale Integr. Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Teresa L. Johnson, Daniel A. Connors, Matthew C. Merten, Wen-mei W. Hwu |
Run-Time Cache Bypassing. |
IEEE Trans. Computers |
1999 |
DBLP DOI BibTeX RDF |
cache bypassing, Data cache, cache management, temporal locality, spatial locality |
67 | Arthur Abnous, Nader Bagherzadeh |
Pipelining and Bypassing in a VLIW Processor. |
IEEE Trans. Parallel Distributed Syst. |
1994 |
DBLP DOI BibTeX RDF |
VLIWprocessor, very long instruction word, pipeline data hazards, performance evaluation, performance, parallel architectures, computer architecture, pipeline processing, pipeline structure, bypassing |
65 | Chua-Chin Wang, Gang-Neng Sung |
A Low-Power 2-Dimensional Bypassing Multiplier Using 0.35 um CMOS Technology. |
ISVLSI |
2006 |
DBLP DOI BibTeX RDF |
|
65 | Yin-Tsung Hwang, Jin-Fa Lin, Ming-Hwa Sheu, Chia-Jen Sheu |
Low Power Multiplier Designs Based on Improved Column Bypassing Schemes. |
APCCAS |
2006 |
DBLP DOI BibTeX RDF |
|
65 | Aviral Shrivastava, Nikil D. Dutt, Alexandru Nicolau, Eugene Earlie |
PBExplore: A Framework for Compiler-in-the-Loop Exploration of Partial Bypassing in Embedded Processors. |
DATE |
2005 |
DBLP DOI BibTeX RDF |
|
65 | Youfeng Wu, Ryan N. Rakvic, Li-Ling Chen, Chyi-Chang Miao, George Chrysos, Jesse Fang |
Compiler managed micro-cache bypassing for high performance EPIC processors. |
MICRO |
2002 |
DBLP DOI BibTeX RDF |
|
55 | Mazen Kharbutli, Yan Solihin |
Counter-Based Cache Replacement and Bypassing Algorithms. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
Cache Bypassing, Counter-Based Algorithms, Cache memories, Cache Replacement, Cache Misses |
55 | Daniel Ortega, Mateo Valero, Eduard Ayguadé |
Dynamic Memory Instruction Bypassing. |
Int. J. Parallel Program. |
2004 |
DBLP DOI BibTeX RDF |
memory bypassing, Prefetching |
53 | Pieter Bellens, Josep M. Pérez, Rosa M. Badia, Jesús Labarta |
Exploiting Locality on the Cell/B.E. through Bypassing. |
SAMOS |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Yin-Tsung Hwang, Jin-Fa Lin, Ming-Hwa Sheu, Chia-Jen Sheu |
Low Power Multipliers Using Enhenced Row Bypassing Schemes. |
SiPS |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Ehsan Atoofian, Amirali Baniasadi |
Improving Energy-Efficiency by Bypassing Trivial Computations. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Daniel Ortega, Eduard Ayguadé, Jean-Loup Baer, Mateo Valero |
Cost-Effective Compiler Directed Memory Prefetching and Bypassing. |
IEEE PACT |
2002 |
DBLP DOI BibTeX RDF |
|
49 | Lei Shu 0001, ZhangBing Zhou, Manfred Hauswirth, Danh Le Phuoc, Peng Yu, Lin Zhang 0012 |
Transmitting streaming data in wireless multimedia sensor networks with holes. |
MUM |
2007 |
DBLP DOI BibTeX RDF |
TPGF routing algorithm, hole-bypassing routing, multi-path transmission, multimedia sensor networks, streaming data |
48 | Aviral Shrivastava, Sanghyun Park, Eugene Earlie, Nikil D. Dutt, Alexandru Nicolau, Yunheung Paek |
Automatic Design Space Exploration of Register Bypasses in Embedded Processors. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Avinash Karanth Kodi, Ahmed Louri, Janet Meiling Wang |
Design of energy-efficient channel buffers with router bypassing for network-on-chips (NoCs). |
ISQED |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Taekkyeun Lee, Chunming Qiao, Murat Demirbas, Jinhui Xu 0001 |
ABC: A Simple Geographic Forwarding Scheme Capable of Bypassing Routing Holes in Sensor Networks. |
ICCCN |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Gang-Neng Sung, Yan-Jhin Ciou, Chua-Chin Wang |
A power-aware 2-dimensional bypassing multiplier using cell-based design flow. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Jonathan Engelsma, James C. Ferrans |
Bypassing Bluetooth Device Discovery Using a Multimodal User Interface. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Jun-ni Ohban, Vasily G. Moshnyaga, Koji Inoue |
Multiplier energy reduction through bypassing of partial products. |
APCCAS (2) |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Nobuo Tsuda, Tatsuyuki Shimizu |
Reconfigurable Mesh-Connected Processor Arrays Using Row-Column Bypassing and Direct Replacement. |
ISPAN |
2000 |
DBLP DOI BibTeX RDF |
|
37 | Roger Espasa, Mateo Valero |
Decoupled Vector Architectures. |
HPCA |
1996 |
DBLP DOI BibTeX RDF |
decoupled vector architectures, trace driven approach, Perfect Club programs, realistic memory latencies, bypassing technique, total memory traffic, performance advantages, performance evaluation, performance, vector processor, vector processor systems, hardware cost |
36 | Hui Zeng, Kanad Ghose |
Register file caching for energy efficiency. |
ISLPED |
2006 |
DBLP DOI BibTeX RDF |
register caching, energy-efficiency, register files |
36 | Andreas Moshovos, Gurindar S. Sohi |
Reducing Memory Latency via Read-after-Read Memory Dependence Prediction. |
IEEE Trans. Computers |
2002 |
DBLP DOI BibTeX RDF |
memory dependence prediction, cache, dynamic optimization, load |
36 | Andreas Moshovos, Gurindar S. Sohi |
Read-After-Read Memory Dependence Prediction. |
MICRO |
1999 |
DBLP DOI BibTeX RDF |
|
30 | Sherri Sparks, Shawn Embleton, Cliff Changchun Zou |
A chipset level network backdoor: bypassing host-based firewall & IDS. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
network backdoor, rootkit, hardware security |
30 | Haakon Dybdahl, Per Stenström |
Enhancing Last-Level Cache Performance by Block Bypassing and Early Miss Determination. |
Asia-Pacific Computer Systems Architecture Conference |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Ko-Chi Kuo, Chi-Wen Chou |
Low Power Multiplier with Bypassing and Tree Strucuture. |
APCCAS |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Mingchen Wen, Sying-Jyan Wang, Yen-Nan Lin |
Low power parallel multiplier with column bypassing. |
ISCAS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Kunal Talwar |
Bypassing the embedding: algorithms for low dimensional metrics. |
STOC |
2004 |
DBLP DOI BibTeX RDF |
TSP, PTAS, routing schemes, doubling metrics, distance labels |
30 | Daniel Ortega, Eduard Ayguadé, Mateo Valero |
Dynamic memory instruction bypassing. |
ICS |
2003 |
DBLP DOI BibTeX RDF |
on-chip memory management, superscalar processors |
25 | Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh |
Scalable network-based buffer overflow attack detection. |
ANCS |
2006 |
DBLP DOI BibTeX RDF |
CTCP, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks, buffer overflow attacks |
25 | Chung-Ho Chen, Arun K. Somani |
Architecture Technique Trade-Offs Using Mean Memory Delay Time. |
IEEE Trans. Computers |
1996 |
DBLP DOI BibTeX RDF |
Bus width, cache hit ratio, memory cycle time, pipelined memory, read-bypassing write buffer, performance trade-off |
24 | Lingxiang Xiang, Tianzhou Chen, Qingsong Shi, Wei Hu 0001 |
Less reused filter: improving l2 cache performance via filtering less reused lines. |
ICS |
2009 |
DBLP DOI BibTeX RDF |
cache filtering, less reused line |
24 | Lionel Lapierre, René Zapata, Pascal Lépinay |
Simulatneous Path Following and Obstacle Avoidance Control of a Unicycle-type Robot. |
ICRA |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Tingting Sha, Milo M. K. Martin, Amir Roth |
NoSQ: Store-Load Communication without a Store Queue. |
MICRO |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Gregory B. Newby |
Paths to creativity in security careers. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Alimujiang Yiming, Toshio Eisaka |
Support Industrial Hard Real-Time Traffic with Switched Ethernet. |
ICESS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Vlad Petric, Tingting Sha, Amir Roth |
RENO - A Rename-Based Instruction Optimizer. |
ISCA |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Mike Clark, Lizy Kurian John |
Performance Evaluation of Configurable Hardware Features on the AMD-K5. |
ICCD |
1999 |
DBLP DOI BibTeX RDF |
AMD-K5, performance evaluation, benchmarking, performance measurement, hardware reconfigurability |
18 | Tatyana Chernonog |
Supply chains of mobile apps: competition, private labels and bypassing when the app's quality is co-created. |
Ann. Oper. Res. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Zheng Zhang, Jingfeng Xue, Tianshi Mu, Ting Yu, Kefan Qiu, Tian Chen, Yuanzhang Li |
Bypassing software-based remote attestation using debug registers. |
Connect. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Qilong Wu 0002, Varun Chandrasekaran |
Bypassing LLM Watermarks with Color-Aware Substitutions. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Mohammadreza Amini, Ghazal Asemian, Michel Kulhandjian, Burak Kantarci, Claude D'Amours, Melike Erol-Kantarci |
Bypassing a Reactive Jammer via NOMA-Based Transmissions in Critical Missions. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Freddy Heppell, Mehmet E. Bakir, Kalina Bontcheva |
Lying Blindly: Bypassing ChatGPT's Safeguards to Generate Hard-to-Detect Disinformation Claims at Scale. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Congpei An, Hao-Ning Wu |
Bypassing the quadrature exactness assumption of hyperinterpolation on the sphere. |
J. Complex. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Jiseok Bang, Jeong Nyeo Kim, Seungkwang Lee |
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Jisu Park, DaYeon Yoo, Nara Yun, Jihoon Lee, DaeYoub Kim |
A Thread Chaining Attack for Bypassing a DLL Injection Monitoring System*. |
ICCE |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Thayne T. Walker, Nathan R. Sturtevant, Ariel Felner |
Clique Analysis and Bypassing in Continuous-Time Conflict-Based Search. |
AAMAS |
2024 |
DBLP BibTeX RDF |
|
18 | Jordan Cahill, Ashkan Parsi, Darragh Mullins, Jonathan Horgan, Enda Ward, Ciarán Eising, Patrick Denny, Brian M. Deegan, Martin Glavin, Edward Jones |
Exploring the Viability of Bypassing the Image Signal Processor for CNN-Based Object Detection in Autonomous Vehicles. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Cong Thuan Do, Cheol Hong Kim, Sung Woo Chung |
Correction to: Aggressive GPU cache bypassing with monolithic 3D-based NoC. |
J. Supercomput. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Cong Thuan Do, Cheol Hong Kim, Sung Woo Chung |
Aggressive GPU cache bypassing with monolithic 3D-based NoC. |
J. Supercomput. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ryuichi Ueda, Leon Tonouchi, Tatsuhiro Ikebe, Yasuo Hayashibara |
Implementation of Brute-Force Value Iteration for Mobile Robot Path Planning and Obstacle Bypassing. |
J. Robotics Mechatronics |
2023 |
DBLP DOI BibTeX RDF |
|
18 | David H. Oaknin |
Bypassing the Kochen-Specker Theorem: An Explicit Non-Contextual Statistical Model for the Qutrit. |
Axioms |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Anoushiravan Zahedi, Sergio Oroz Artigas, Nora Swaboda, Corinde E. Wiers, Kai Görgen, Soyoung Q. Park |
Neural correlates of changing food choices while bypassing values. |
NeuroImage |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Alexander Rothkopf, Jan Nordström |
A new variational discretization technique for initial value problems bypassing governing equations. |
J. Comput. Phys. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Luke Bhan, Yuanyuan Shi, Miroslav Krstic |
Neural Operators for Bypassing Gain and Control Computations in PDE Backstepping. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Davide Bilò, Shiri Chechik, Keerti Choudhary, Sarel Cohen, Tobias Friedrich 0001, Martin Schirneck |
Improved Approximate Distance Oracles: Bypassing the Thorup-Zwick Bound in Dense Graphs. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Fabian David Schmidt, Ivan Vulic, Goran Glavas |
One For All & All For One: Bypassing Hyperparameter Tuning with Model Averaging For Cross-Lingual Transfer. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Jason Vega, Isha Chaudhary, Changming Xu, Gagandeep Singh |
Bypassing the Safety Training of Open-Source LLMs with Priming Attacks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas |
Bypassing antivirus detection: old-school malware, new tricks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng 0007, Qinglong Wang, Zhan Qin, Zhibo Wang 0001, Kui Ren 0001 |
SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Haolin Liu, Chen-Yu Wei, Julian Zimmert |
Bypassing the Simulator: Near-Optimal Adversarial Linear Contextual Bandits. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Thayne T. Walker, Nathan R. Sturtevant, Ariel Felner |
Clique Analysis and Bypassing in Continuous-Time Conflict-Based Search. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Che Liu, Anand Shah, Wenjia Bai, Rossella Arcucci |
Utilizing Synthetic Data for Medical Vision-Language Pre-training: Bypassing the Need for Real Images. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mohammed M. Alani, Atefeh Mashatan, Ali Miri |
Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju 0001, Qingchuan Zhao |
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Enrique Soriano-Salvador, Gorka Guardiola Muzquiz |
Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Vincent Giraud, David Naccache |
Bypassing Android isolation with fuel gauges: new risks with advanced power ICs. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | SeonJin Hwang, Assem Utaliyeva, Jae-Seok Kim, Yoon-Ho Choi |
Bypassing Heaven's Gate Technique Using Black-Box Testing. |
Sensors |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mathew Nicho, Ibrahim Sabry |
Bypassing Multiple Security Layers Using Malicious USB Human Interface Device. |
ICISSP |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Benjamin David Evans, Johannes Betz, Hongrui Zheng, Herman A. Engelbrecht, Rahul Mangharam, Hendrik W. Jordaan |
Bypassing the Simulation-to-Reality Gap: Online Reinforcement Learning Using a Supervisor. |
ICAR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hélène Kabbech, Jente van Staalduinen, Frank Grosveld, Ihor Smal |
Accurate Estimation of Particle Dynamics Bypassing Substrate Drift Bias: Application to Cell Nucleus Motion. |
ISBI |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sachin Bagga, Ruchika Gupta, John Jose |
PortBlocker: Detection and Mitigation of Hardware Trojan through Re-routing and Bypassing. |
MCSoC |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas |
Bypassing antivirus detection: old-school malware, new tricks. |
ARES |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Shimon Kogan, Merav Parter |
Towards Bypassing Lower Bounds for Graph Shortcuts. |
ESA |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Prashanth Amireddy, Ankit Garg, Neeraj Kayal, Chandan Saha 0001, Bhargav Thankey |
Low-Depth Arithmetic Circuit Lower Bounds: Bypassing Set-Multilinearization. |
ICALP |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Malith Gallage, Rafaela Scaciota, Sumudu Samarakoon, Mehdi Bennis |
A Simplified Intelligent Autonomous Obstacle Bypassing Method for Mobile Robots. |
MobiCom |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef |
Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables. |
USENIX Security Symposium |
2023 |
DBLP BibTeX RDF |
|
18 | Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef |
Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues. |
USENIX Security Symposium |
2023 |
DBLP BibTeX RDF |
|
18 | Xing Li, Xiaochong Jiang, Ye Yang, Lilong Chen, Tianyu Xu, Chao Xu, Longbiao Xiao, Fengmin Shi, Yi Wang, Taotao Wu, Yilong Lv, Hangfeng Gao, Zikang Chen, Yisong Qiao, Hongwei Ding, Yijian Dong, Chengkun Wei, Zihui Zhang, Shunmin Zhu, Wenzhi Chen |
Poster: Triton: Accelerating vSwitch with Flexibility through Hardware Assisting not Bypassing Software. |
SIGCOMM |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Wenju He, Yilong Guo, Xinmin Tian, Hideki Saito 0001, Wenwan Xing, Feng Zou, Chunyang Dai, Maosu Zhao, Haonan Yang |
Streamline Ahead-of-Time SYCL CPU Device Implementation through Bypassing SPIR-V. |
IWOCL |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Fabian David Schmidt, Ivan Vulic, Goran Glavas |
One For All & All For One: Bypassing Hyperparameter Tuning with Model Averaging for Cross-Lingual Transfer. |
EMNLP (Findings) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Haolin Liu, Chen-Yu Wei, Julian Zimmert |
Bypassing the Simulator: Near-Optimal Adversarial Linear Contextual Bandits. |
NeurIPS |
2023 |
DBLP BibTeX RDF |
|
18 | Yizi Zhang, Tianxiao He, Julien Boussard, Charles Windolf, Olivier Winter, Eric Trautmann, Noam Roth, Hailey Barrell, Mark Churchland, Nicholas A Steinmetz, Erdem Varol, Cole L. Hurwitz, Liam Paninski |
Bypassing spike sorting: Density-based decoding using spike localization from dense multielectrode probes. |
NeurIPS |
2023 |
DBLP BibTeX RDF |
|
18 | Xu Lin 0003, Frederico Araujo, Teryl Taylor, Jiyong Jang, Jason Polakis |
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses. |
SP |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Jianhao Xu, Luca Di Bartolomeo, Flavio Toffalini, Bing Mao, Mathias Payer |
WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches. |
SP |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Jialai Wang, Wenjie Qu 0001, Yi Rong, Han Qiu 0001, Qi Li 0002, Zongpeng Li, Chao Zhang 0008 |
MPass: Bypassing Learning-based Static Malware Detectors. |
DAC |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Maryam Motallebighomi, Harshad Sathaye, Mridula Singh, Aanjhan Ranganathan |
Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication. |
WISEC |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mojtaba Hemmati, Mohammad Ali Hadavi |
Bypassing Web Application Firewalls Using Deep Reinforcement Learning. |
ISC Int. J. Inf. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Nachaat Mohamed |
Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework. |
F1000Research |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Zeyu Mi, Haoqi Zhuang, Binyu Zang, Haibo Chen 0001 |
General and Fast Inter-Process Communication via Bypassing Privileged Software. |
IEEE Trans. Computers |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Doowon Lee, Valeria Bertacco |
Bypassing Multicore Memory Bugs With Coarse-Grained Reconfigurable Logic. |
IEEE Trans. Computers |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Hafiza Sadia Nawaz, Zhensheng Shi, Yanhai Gan, Amanuel Hirpa, Junyu Dong, Haiyong Zheng |
Temporal Moment Localization via Natural Language by Utilizing Video Question Answers as a Special Variant and Bypassing NLP for Corpora. |
IEEE Trans. Circuits Syst. Video Technol. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Yoshiya Shikama, Ryuta Kawano, Hiroki Matsutani, Hideharu Amano, Yusuke Nagasaka, Naoto Fukumoto, Michihiro Koibuchi |
A traffic-aware memory-cube network using bypassing. |
Microprocess. Microsystems |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Ranjit M. Christopher, Sungho Park, Sang Pil Han, Min-Kyu Kim |
Bypassing Performance Optimizers of Real Time Bidding Systems in Display Ad Valuation. |
Inf. Syst. Res. |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 577 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|