Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Future Large-Scale Memristive Device Crossbar Arrays: Limits Imposed by Sneak-Path Currents on Read Operations., , , , and . CoRR, (2015)Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality., , , and . IACR Cryptology ePrint Archive, (2015)PUF-FSM: A Controlled Strong PUF., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 37 (5): 1104-1108 (2018)Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables., , , , and . CoRR, (2023)BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)NTD: Non-Transferability Enabled Deep Learning Backdoor Detection., , , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Vertical Federated Learning: Taxonomies, Threats, and Prospects., , , , , , , and . CoRR, (2023)A free-energy principle for representation learning., and . Mach. Learn. Sci. Technol., 2 (4): 45004 (2021)Wisecr: Secure Simultaneous Code Dissemination to Many Batteryless Computational RFID Devices., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2188-2207 (May 2023)SEDML: Securely and Efficiently Harnessing Distributed Knowledge in Machine Learning., , , , , and . CoRR, (2021)