Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Phenotyping for Network Traffic Classification and Anomaly Detection., , , and . CoRR, (2018)Improved analysis and optimal priority assignment for communicating threads on uni-processor., , , , and . J. Syst. Archit., (2022)Improving Efficiency and Lifetime of Logic-in-Memory by Combining IMPLY and MAGIC Families., , , , and . J. Syst. Archit., (2021)TDPP: Two-Dimensional Permutation-Based Protection of Memristive Deep Neural Networks., , , , , , , , and . CoRR, (2023)TDPP: 2-D Permutation-Based Protection of Memristive Deep Neural Networks., , , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (3): 742-755 (March 2024)EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles., , , , and . J. Syst. Archit., (2021)Security Enhancement for RRAM Computing System through Obfuscating Crossbar Row Connections., , , , , and . DATE, page 466-471. IEEE, (2020)Secure distributed framework based on seamless key session for smart home environment., , and . IJDSN, (2018)Enhancing Security of Memristor Computing System Through Secure Weight Mapping., , , , and . ISVLSI, page 182-187. IEEE, (2022)Efficient Training of the Memristive Deep Belief Net Immune to Non-Idealities of the Synaptic Devices., , , , , , , , , and 1 other author(s). CoRR, (2022)