Tamara Silbergleit Lehman

Orcid: 0000-0001-9779-1838

Affiliations:
  • University of Colorado-Boulder, USA


According to our database1, Tamara Silbergleit Lehman authored at least 15 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Toxicity Phenomenon Across Social Media.
CoRR, 2024

Baobab Merkle Tree for Efficient Secure Memory.
IEEE Comput. Archit. Lett., 2024

A Midsummer Night's Tree: Efficient and High Performance Secure SCM.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

2023
SpecCheck: A Tool for Systematic Identification of Vulnerable Transient Execution in gem5.
Proceedings of the 32nd International Conference on Parallel Architectures and Compilation Techniques, 2023

2022
Do Twitter users change their behavior after exposure to misinformation? An in-depth analysis.
Soc. Netw. Anal. Min., 2022

Eliminating Micro-Architectural Side-Channel Attacks using Near Memory Processing.
Proceedings of the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), 2022

Acuerdo: Fast Atomic Broadcast over RDMA.
Proceedings of the 51st International Conference on Parallel Processing, 2022

2021
Analyzing Twitter Users' Behavior Before and After Contact by the Russia's Internet Research Agency.
Proc. ACM Hum. Comput. Interact., 2021

A New Foe in GPUs: Power Side-Channel Attacks on Neural Network.
Proceedings of the 22nd International Symposium on Quality Electronic Design, 2021

Analyzing behavioral changes of Twitter users after exposure to misinformation.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

2020
Analyzing Twitter Users' Behavior Before and After Contact by the Internet Research Agency.
CoRR, 2020

Understanding How Readers Determine the Legitimacy of Online News Articles in the Era of Fake News.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2019
Design Strategies for Efficient and Secure Memory.
PhD thesis, 2019

2018
MAPS: Understanding Metadata Access Patterns in Secure Memory.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2018

2016
PoisonIvy: Safe speculation for secure memory.
Proceedings of the 49th Annual IEEE/ACM International Symposium on Microarchitecture, 2016


  Loading...