Author of the publication

A Brain-inspired Approach for Malware Detection using Sub-semantic Hardware Features.

, , and . ACM Great Lakes Symposium on VLSI, page 139-142. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BM-Seg: A new bone metastases segmentation dataset and ensemble of CNN-based segmentation approach., , , , , , and . Expert Syst. Appl., (October 2023)A Comprehensive Fault Injection Strategy for Embedded Systems Reliability Assessment., , , and . RSP, page 22-28. IEEE, (2018)Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters., , , and . DATE, page 774-779. IEEE, (2021)Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine Learning Approach.. DSD, page 383-390. IEEE, (2022)VPP: Privacy Preserving Machine Learning via Undervolting., , , and . HOST, page 315-325. IEEE, (2023)Stochastic-HMDs: Adversarial-Resilient Hardware Malware Detectors via Undervolting., , and . DAC, page 1-6. IEEE, (2023)Ultra High Frequency Acoustic Coda Waves., , , , and . (May 2022)A novel public dataset for multimodal multiview and multispectral driver distraction analysis: 3MDAD., , , and . Signal Process. Image Commun., (2020)PDF-Malware: An Overview on Threats, Detection and Evasion Attacks., , and . CoRR, (2021)SIT: Stochastic Input Transformation to Defend Against Adversarial Attacks on Deep Neural Networks., , , , and . IEEE Des. Test, 39 (3): 63-72 (2022)