Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest Editor Introduction: Embedded Security Challenge.. IEEE Embed. Syst. Lett., 10 (3): 81-82 (2018)Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering., , and . CPSS@AsiaCCS, page 15-20. ACM, (2017)Multiple-Bit Upset Protection in Microprocessor Memory Arrays Using Vulnerability-Based Parity Optimization and Interleaving., , and . IEEE Trans. Very Large Scale Integr. Syst., 23 (11): 2447-2460 (2015)Hardware-Layer Intelligence Collection for Smart Grid Embedded Systems., and . J. Hardw. Syst. Secur., 3 (2): 132-146 (2019)Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems., , , and . CoRR, (2023)GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment., , , , , and . IET Cyper-Phys. Syst.: Theory & Appl., 2 (4): 180-187 (2017)Extending residue-based fault tolerance to encrypted computation., and . ITC, page 1-10. IEEE, (2015)Privilege escalation attack through address space identifier corruption in untrusted modern processors.. DTIS, page 161-166. IEEE, (2013)Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining., , , and . CPSIOTSEC@CCS, page 31-36. ACM, (2020)A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation., and . CPS-SPC@CCS, page 81-92. ACM, (2016)