Author of the publication

New Passive and Active Attacks on Deep Neural Networks in Medical Applications.

, , , , , , , and . ICCAD, page 39:1-39:9. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PIFT: efficient dynamic information flow tracking using secure page allocation., , and . WESS, ACM, (2009)An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card., , , and . IACR Cryptology ePrint Archive, (2016)Guest Editorial: Special Section on Embedded System Security., , and . IEEE Embed. Syst. Lett., 7 (1): 1-2 (2015)Side-channel Timing Attack of RSA on a GPU., , and . ACM Trans. Archit. Code Optim., 16 (3): 32:1-32:18 (2019)DAP-MAC: A delay-aware probability-based MAC protocol for underwater acoustic sensor networks., and . Ad Hoc Networks, (2016)Leveraging speculative architectures for runtime program validation., and . ACM Trans. Embed. Comput. Syst., 13 (1): 3:1-3:18 (2013)A Guessing Entropy-Based Framework for Deep Learning-Assisted Side-Channel Analysis., , and . IEEE Trans. Inf. Forensics Secur., (2023)Intrinsic Examples: Robust Fingerprinting of Deep Neural Networks., , , , , , , and . BMVC, page 46. BMVA Press, (2021)Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs)., , , , and . HASP@ISCA, page 10:1-10:8. ACM, (2014)Microarchitectural support for program code integrity monitoring in application-specific instruction set processors., and . DATE, page 815-820. EDA Consortium, San Jose, CA, USA, (2007)