Author of the publication

Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models.

, , , , , and . DAC, page 1-6. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive page segmentation for color technical journals' cover images., and . Image Vis. Comput., 16 (12-13): 855-877 (1998)OP-Triplet-ELM: Identification of real and pseudo microRNA precursors using extreme learning machine with optimal features., , , , , , and . J. Bioinform. Comput. Biol., 14 (1): 1650006:1-1650006:14 (2016)Strengthen-Gray Relative Analysis access selection algorithm based on load balance in heterogeneous wireless networks., , , and . ICNC, page 843-847. IEEE, (2012)Further insight into the Shamanskii modification of Newton method., , and . Appl. Math. Comput., 180 (1): 46-52 (2006)Research on control strategy of the energy storage system for photovoltaic and storage combined system., , , , , and . IECON, page 2813-2818. IEEE, (2017)Global convergence of a modified spectral FR conjugate gradient method., and . Appl. Math. Comput., 202 (2): 766-770 (2008)HTML integrity authentication based on fragile digital watermarking., , , , and . GrC, page 322-325. IEEE Computer Society, (2009)Promoter recognition based on the maximum entropy hidden Markov model., , , , , , and . Comput. Biol. Medicine, (2014)Determining Wave Height from Nearshore Videos Based on Multi-level Spatiotemporal Feature Fusion., , , , and . IJCNN, page 1-8. IEEE, (2021)Analysis and forecasting of urban traffic condition based on categorical data., and . SOLI, page 113-118. IEEE, (2016)