Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Average-case Analysis of the Assignment Problem with Independent Preferences., and . IJCAI, page 287-293. ijcai.org, (2019)Orientation-based Feature Aggregation for Multi-Target Multi-Camera Tracking., , , , and . ICPS, page 1-6. IEEE, (2023)SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices., , , , , and . (July 2018)SegScope: Probing Fine-grained Interrupts via Architectural Footprints., , , , , , and . HPCA, page 424-438. IEEE, (2024)Lightweight (Reverse) Fuzzy Extractor with Multiple Referenced PUF Responses., , , and . CoRR, (2018)RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things., , , , , , , , and . CoRR, (2021)MLMSA: Multi-Label Multi-Side-Channel-Information enabled Deep Learning Attacks on APUF Variants., , , , , , and . CoRR, (2022)On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning., , , , , , , and . Comput. Secur., (October 2023)Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems., , , , , , , , , and 5 other author(s). Comput. Secur., (2024)