From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Emerging Technology-Based Design of Primitives for Hardware Security., , , , , , , , и . ACM J. Emerg. Technol. Comput. Syst., 13 (1): 3:1-3:19 (2016)Dual-Residue Montgomery Multiplication., , и . NPC, том 4672 из Lecture Notes in Computer Science, стр. 267-276. Springer, (2007)The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction., , и . IEEE Des. Test, 33 (2): 76-96 (2016)RTSEC: Automated RTL Code Augmentation for Hardware Security Enhancement., , , , и . DATE, стр. 596-599. IEEE, (2022)Protecting Platoons from Stealthy Jamming Attack., , , и . AsianHOST, стр. 1-6. IEEE, (2020)Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules., , , , , и . AsiaCCS, стр. 349-362. ACM, (2021)Towards scalable, secure, and smart mission-critical IoT systems: review and vision., , , , , , и . EMSOFT, стр. 1-10. ACM, (2021)THE-V: Verifiable Privacy-Preserving Neural Network via Trusted Homomorphic Execution., , , , и . ICCAD, стр. 1-9. IEEE, (2023)Security for safety: a path toward building trusted autonomous vehicles., , , , и . ICCAD, стр. 92. ACM, (2018)Quantifying Rowhammer Vulnerability for DRAM Security., , , , , и . DAC, стр. 73-78. IEEE, (2021)