Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Short Hierarchical Identity-based Encryption in the Selective-ID Model., , , , and . J. Softw., 8 (7): 1613-1619 (2013)Many-Criteria Evaluation of Infrastructure Investment Priorities for Distribution Network Planning., , , , , , and . IEEE Access, (2020)Development and Evaluation of Hardware Obfuscation Benchmarks., , , , , , and . J. Hardw. Syst. Secur., 2 (2): 142-161 (2018)FPGAPRO: A Defense Framework Against Crosstalk-Induced Secret Leakage in FPGA., , and . ACM Trans. Design Autom. Electr. Syst., 27 (3): 24:1-24:31 (2022)LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference., , , , , , , , , and 1 other author(s). CoRR, (2023)EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering., , , and . CoRR, (2019)A Privacy-Preserving DNN Pruning and Mobile Acceleration Framework., , , , , , , , , and . CoRR, (2020)NNSplitter: An Active Defense Solution to DNN Model via Automated Weight Obfuscation., , , and . CoRR, (2023)A Brain-Inspired Low-Dimensional Computing Classifier for Inference on Tiny Devices., , and . CoRR, (2022)MetaLDC: Meta Learning of Low-Dimensional Computing Classifiers for Fast On-Device Adaption., , , and . CoRR, (2023)