Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ghassami, AmirEmad
add a person with the name Ghassami, AmirEmad
 

Other publications of authors with the same name

A Covert Queueing Channel in FCFS Schedulers., and . CoRR, (2017)Counting and Uniform Sampling from Markov Equivalent DAGs., , and . CoRR, (2018)REORDER: Securing Dynamic-Priority Real-Time Systems Using Schedule Obfuscation., , , , and . CoRR, (2018)Budgeted Experiment Design for Causal Structure Learning., , , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 1719-1728. PMLR, (2018)Characterizing Distribution Equivalence for Cyclic and Acyclic Directed Graphs., , and . CoRR, (2019)Sneak-Peek: High speed covert channels in data center networks., , , , , , , , and . INFOCOM, page 1-9. IEEE, (2016)Message partitioning and limited auxiliary randomness: Alternatives to Honey Encryption., , and . ISIT, page 1371-1375. IEEE, (2016)Counting and Sampling from Markov Equivalent DAGs Using Clique Trees., , , and . AAAI, page 3664-3671. AAAI Press, (2019)A Covert Queueing Channel in Round Robin Schedulers., , , and . CoRR, (2017)A Reconnaissance Attack Mechanism for Fixed-Priority Real-Time Systems., , , , , , and . CoRR, (2017)