Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time detection of hardware trojan attacks on General-Purpose Registers in a RISC-V processor., , , , , and . IEICE Electron. Express, 18 (10): 20210098 (2021)IR-drop calibration for Hardware Trojan detection., , , , and . ISCID, page 418-421. IEEE, (2020)A Survey of Trust Assessment Technology Research for Edge Computing., , , , and . NaNA, page 34-39. IEEE, (2023)Privacy protection scheme for edge computing based on function encryption., , , , , and . NaNA, page 131-135. IEEE, (2021)Improving the transferability of adversarial examples through neighborhood attribution., , , , , and . Knowl. Based Syst., (2024)ECC-based Secure Communication Platform for Unmanned Systems., , , , and . AAIA, page 359-363. ACM, (2023)Hardware Trojan detection method based on the frequency domain characteristics of power consumption., , , , , and . ISCID, page 410-413. IEEE, (2020)A Survey of Edge Computing Resource Allocation Strategies Based on Federated Learning., , , , and . NaNA, page 116-121. IEEE, (2023)A kernel recursive minimum error entropy adaptive filter., , , , , , and . Signal Process., (2022)Research on Privacy Preserving Computing Technology in Edge Computing., , , , , , and . NaNA, page 98-103. IEEE, (2023)