Publications

Export (179) results:[Tagged][XML][BibTex]
Sort by:[Year][Title][Type][Author]
Filters: author is Lee  [Clear All Filters]
H
He, Z., Lee, R.B., "How secure is your cache against side-channel attacks?", IEEE/ACM International Symposium on Microarchitecture (Micro), Boston, Massachusetts, USA, ACM, Oct 2017. Tagged XML BibTex
Lee, W., Liu, C., Ji, S., Mittal, P., Lee, R.B., "How to Quantify Graph De-anonymization Risks", Springer Information Systems Security and Privacy: Springer, 2017  . Tagged XML BibTex
Szefer, J., Lee, R.B., "Hardware-Enhanced Security for Cloud", Secure Cloud Computing , Berlin, Springer, pp. 57-76, 2014  . Tagged XML BibTex
Chen, Y., Lee, R.B., "Hardware-Assisted Application-Level Access Control", Information Security Conference, Pisa, Italy, September 2009. Abstract Tagged XML BibTex
Elbaz, R., Champagne, D., Gebotys, C., Lee, R.B., Potlapally, N., Torres, L., "Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines", Transactions on Computational Science IV, Lecture Notes in Computer Science (LNCS), issue 5340, pp. 1-22, March 2009. Abstract Tagged XML BibTex
Lan, T., Lin, X., Chiang, M., Lee, R.B., "How Bad is Suboptimal Rate Allocation?", Proceedings of the 27th. Conference on Computer Communications, IEEE (INFOCOM ’08), pp. 951-959, April 13-18 2008. Tagged XML BibTex
Dwoskin, J., Lee, R.B., "Hardware-rooted Trust for Secure Key Management and Transient Trust", ACM Conference on Computer and Communications Security (CCS) 2007, Alexandria, VA, pp. 389-400, October 2007. Abstract Tagged XML BibTex
Lee, R.B., Shi, Z., Yang, X., "How a Processor can Permute n bits in O(1) cycles", Proceedings of IEEE Hot Chips 14 - A Symposium on High Performance Chips, Stanford University, USA, Aug. 2002. Tagged XML BibTex
Mahon, M., Lee, R.B., Miller, T., Huck, J., Bryg, W., "Hewlett-Packard Precision Architecture: the Processor", HP Journal, vol. 37, issue 8, pp. 19, 08/1986. Tagged XML BibTex
I
Lee, W., Ortiz, J., Ko, B., Lee, R.B., "Inferring Smartphone Users' Handwritten Patterns by Using Motion Sensors (Best Paper Award)", 4th Internation Conference on Information System Security and Privacy, Funchal, Madeira, Portugal, 22/01/2018. Abstract Tagged XML BibTex
Lee, W., Lee, R., "Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning", IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, 06/26/2017. Abstract Tagged XML BibTex
Lee, W., Lee, R.B., "Implicit Sensor-based Authentication of Smartphone Users with Smartwatch", Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 2016. Abstract Tagged XML BibTex
Lee, W., Lee, R.B., "Implicit Authentication for Smartphone Security", Information Systems Security and Privacy, vol. 576: Springer, pp. 160-176, 2015  . Abstract Tagged XML BibTex
Lee, R.B., "Improving Cyber Security", Advances in Cyber Security: Technology, Operations and Experiences: Fordham University Press, pp. 37-59, 2013  . Tagged XML BibTex
Chen, Y., Wu, Y., Hu, S., Lee, R.B., "Impact of Dynamic Binary Translators on Security", 1st Workshop on Architectural and Microarchitectural Support for Binary Translation, Beijing, China, 21/06/2008. Abstract Tagged XML BibTex
Potlapally, N., Ravi, S., Raghunathan, A., Lee, R.B., Jha, N., "Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors", Proceedings of the 19th International Conference on VLSI Design (VLSID 2006), Hyderabad, India, IEEE Computer Society, pp. 299-304, January 2006. Tagged XML BibTex
Shi, Z.J., Lee, R.B., "Implementation Complexity of Bit Permutation Instructions", Proceedings of the 37th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, California, Pacific Grove, California, USA, pp. 879-886, Nov. 2003. Tagged XML BibTex
Lee, R.B., "Instruction Set Architecture for Multimedia Signal Processing", Book Chapter in Vojin G. Oklobdzija ed., The Computer Engineering Handbook: CRC Press, ISBN: 0-8493-0885-2, Invited Chapter, pp. 39-1 to 39-38, 2001  . Tagged XML BibTex
K
Xu, D., Dwoskin, J., Huang, J., Lan, T., Lee, R.B., , M.C., "Key management in wireless ad hoc networks", Theoretical Aspects of Distributed Computing in Sensor Networks, 2010  . Abstract Tagged XML BibTex
L
Liu, F., Yarom, Y., Ge, Q., Heiser, G., Lee, R.B., "Last-Level Cache Side-Channel Attacks are Practical", Proceedings of IEEE Symposium on Security and Privacy, San Jose, pp. 605-622, May 2015. Tagged XML BibTex
M
He, Z., Zhang, T., Lee, R., "Model Inversion Attacks Against Collaborative Inference", ACM Annual Computer Security Applications Conference (ACSAC): ACM, 12/09/2019. Tagged XML BibTex
He, Z., Zhang, T., Lee, R.B., "Machine Learning Based DDoS Attack Detection from Source Side in Cloud", IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), New York, IEEE, June 2017. Tagged XML BibTex
Zhang, T., Lee, R.B., "Monitoring and Attestation of Virtual Machine Security Health in Cloud Computing", IEEE Micro Special Issues on Security, vol. 36, issue 5, Sept/Oct 2016. Abstract Tagged XML BibTex
Lee, W., Lee, R.B., "Multi-sensor authentication to improve smartphone security", Proceedings of International Conference on Information Systems Security and Privacy, February 2015. Abstract Tagged XML BibTex
Yarom, Y., Ge, Q., Liu, F., Lee, R.B., Heiser, G., "Mapping the Intel Last-Level Cache", IACR Cryptology ePrint Archive, Report 2015/905, 2015  . Tagged XML BibTex