• 3442 Citations
  • 30 h-Index
1980 …2018
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 5 Similar Profiles
Hardware Engineering & Materials Science
Reduced instruction set computing Engineering & Materials Science
Cloud computing Engineering & Materials Science
Cryptography Engineering & Materials Science
Microprocessor chips Engineering & Materials Science
Data storage equipment Engineering & Materials Science
Processing Engineering & Materials Science
Computer hardware Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1980 2018

Analyzing cache side channels using deep neural networks

Zhang, T., Zhang, Y. & Lee, R. B-L., Dec 3 2018, ACM International Conference Proceeding Series. Association for Computing Machinery, p. 174-186 13 p.

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural networks
Leakage (fluid)
Program processors
Computer systems
Side channel attack
2 Citations
Virtual Machine
Health
Monitoring
Customers
Semantics

How to quantify graph De-anonymization risks

Lee, W. H., Liu, C., Ji, S., Mittal, P. & Lee, R. B-L., Jan 1 2018, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Mori, P., Camp, O. & Furnell, S. (eds.). Springer Verlag, p. 84-104 21 p. (Communications in Computer and Information Science; vol. 867).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantify
Graph in graph theory
Attack
Privacy
Internet

Inferring smartphone users’ handwritten patterns by using motion sensors

Lee, W. H., Ortiz, J., Ko, B. & Lee, R. B-L., Jan 1 2018, ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). SciTePress, Vol. 2018-January. p. 139-148 10 p.

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Sensors
Touch screens
Gyroscopes
Accelerometers

Leveraging hardware transactional memory for cache side-channel defenses

Chen, S., Liu, F., Mi, Z., Zhang, Y., Lee, R. B-L., Chen, H. & Wang, X. F., May 29 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 601-608 8 p.

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer hardware
Data storage equipment
Retrofitting
Software design
Program processors