Name
Affiliation
Papers
RUBY LEE
Princeton University, Princeton, USA
149
Collaborators
Citations 
PageRank 
173
2460
261.28
Referers 
Referees 
References 
4519
2366
1738
Search Limit
1001000
Title
Citations
PageRank
Year
Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems20.372021
Speculative Execution Attacks and Hardware Defenses00.342021
Actionbert: Leveraging User Actions For Semantic Understanding Of User Interfaces00.342021
HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020.00.342020
Position Paper - Consider Hardware-enhanced Defenses for Rootkit Attacks.00.342020
Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning10.632019
Sensitive-Sample Fingerprinting Of Deep Neural Networks00.342019
Model inversion attacks against collaborative inference90.452019
Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health.20.412018
VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting.00.342018
Time Series Segmentation through Automatic Feature Learning.40.412018
Practical and Scalable Security Verification of Secure Architectures.00.342018
Privacy-preserving Machine Learning through Data Obfuscation.10.352018
Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses.40.372018
Record-Replay Architecture as a General Security Framework20.382018
Implicit Sensor-based Authentication of Smartphone Users with Smartwatch.60.472017
Host-Based Dos Attacks and Defense in the Cloud20.382017
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning50.432017
How to Quantify Graph De-anonymization Risks.10.362017
Sensor-Based Implicit Authentication of Smartphone Users00.342017
Machine Learning Based DDoS Attack Detection from Source Side in Cloud30.362017
Blind De-anonymization Attacks using Social Networks10.352017
Cloud Server Benchmarks for Performance Evaluation of New Hardware Architecture.00.342016
Newcache: Secure Cache Architecture Thwarting Cache Side-Channel Attacks.110.582016
A hardware-based technique for efficient implicit information flow tracking.00.342016
Monitoring and Attestation of Virtual Machine Security Health in Cloud Computing.00.342016
Rethinking Computers for Cybersecurity20.362015
Disruptive prefetching: impact on side-channel attacks and cache designs80.542015
Can randomized mapping secure instruction caches from side-channel attacks?20.462015
A 32kB secure cache memory with dynamic replacement mapping in 65nm bulk CMOS10.392015
Last-Level Cache Side-Channel Attacks are Practical2235.342015
CloudMonatt: an architecture for security health monitoring and attestation of virtual machines in cloud computing90.522015
Random Fill Cache Architecture461.282014
Cyber defenses for physical attacks and insider threats in cloud computing00.342014
BitDeposit: Deterring Attacks and Abuses of Cloud Computing Services through Economic Measures40.892013
Side channel vulnerability metrics: the promise and the pitfalls.140.662013
Security testing of a secure cache design130.762013
Integration of butterfly and inverse butterfly nets in embedded processors: Effects on power saving00.342012
A software-hardware architecture for self-protecting data220.822012
Security verification of hardware-enabled attestation protocols00.342012
Hardware enhanced security00.342012
Physical attack protection with human-secure virtualization in data centers50.472012
Architectural support for hypervisor-secure virtualization491.582012
Eliminating the hypervisor attack surface for a more secure cloud642.032011
A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing110.602011
Stability and benefits of suboptimal utility maximization10.382011
Rapid single-chip secure processor prototyping on the OpenSPARC FPGA platform10.372011
General-purpose FPGA platform for efficient encryption and hashing10.362010
NoHype: virtualized cloud infrastructure without the virtualization1174.302010
Accountability in hosted virtual networks110.902009
  • 1
  • 2