Author of the publication

Acoustics to the Rescue: Physical Key Inference Attack Revisited.

, , , , , , , and . USENIX Security Symposium, page 3255-3272. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hot-LEGO: Architect Microfluidic Cooling Equipped 3DIC with Pre-RTL Thermal Simulation., , , and . IGSC, page 14-17. ACM, (2023)Power and Thermal Modeling of In-3D-Memory Computing., , , , , and . ISDCS, page 1-4. IEEE, (2021)UniverSense: IoT Device Pairing through Heterogeneous Sensing Signals., , , , , , and . HotMobile, page 55-60. ACM, (2018)Stein Variational Gradient Descent Without Gradient., and . ICML, volume 80 of Proceedings of Machine Learning Research, page 1895-1903. PMLR, (2018)Protecting data in multi-stakeholder web service system., , , and . WWW, page 1163-1164. ACM, (2010)Source-Based Path Selection: The Data Plane Perspective., , , , , and . CFI, page 41-45. ACM, (2015)A hardware-efficient variable-length FFT processor for low-power applications., , , and . APSIPA, page 1-4. IEEE, (2013)Using Temporal Business Rules to Synthesize Service Composition Process Models., , , and . ACT4SOC, page 85-94. INSTICC Press, (2007)Context Aware and Adaptive Systems., , , and . Context in Computing, Springer, (2014)Analysis of adaptive support-weight based stereo matching for hardware realization., , , , and . ASICON, page 51-54. IEEE, (2011)