Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts., , , , , , , , , and . CoRR, (2021)Towards Effective Multi-Task Interaction for Entity-Relation Extraction: A Unified Framework with Selection Recurrent Network., , , and . CoRR, (2022)SAM Meets Robotic Surgery: An Empirical Study in Robustness Perspective., , , , and . CoRR, (2023)An Efficient MLP-based Point-guided Segmentation Network for Ore Images with Ambiguous Boundary., , , , , , , and . CoRR, (2024)Analysis of Software Implemented Low Entropy Masking Schemes., , , and . Secur. Commun. Networks, (2018)Side-Channel Attack on a Protected RFID Card., , , , , , and . IEEE Access, (2018)Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing., , , , , and . IEEE Access, (2019)Attacking the Edge-of-Things: A Physical Attack Perspective., , , , , , and . IEEE Internet Things J., 9 (7): 5240-5253 (2022)Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks., , and . KSII Trans. Internet Inf. Syst., 7 (5): 1094-1107 (2013)Differential Fault Attack on ITUbee Block Cipher., , , , and . ACM Trans. Embed. Comput. Syst., 16 (2): 54:1-54:10 (2017)