Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy attacks and defense techniques for wireless systems., , and . WISEC, page 185-194. ACM, (2013)Development and Validation of a Reproducible and Label-Free Surface Plasmon Resonance Immunosensor for Enrofloxacin Detection in Animal-Derived Foods., , , , and . Sensors, 17 (9): 1984 (2017)Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry., , , and . DAC, page 90-95. ACM, (2012)Low latency live video streaming using HTTP chunked encoding., and . MMSP, page 1-6. IEEE, (2011)An Optimal Admission Control Policy for CDMA Multiple Antenna Systems with QoS Constraints., and . WCNC, page 1826-1831. IEEE, (2008)The study of norm vacuum for duplex pressure condenser based on support vector regression and genetic algorithm., , and . ICNC, page 945-948. IEEE, (2010)Scalable consistency-based hardware trojan detection and diagnosis., and . NSS, page 176-183. IEEE, (2011)EvoIsolator: Evolving Program Slices for Hardware Isolation Based Security., , , and . SSBSE, volume 11036 of Lecture Notes in Computer Science, page 377-382. Springer, (2018)Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels., , , and . DAC, page 90:1-90:6. ACM, (2014)Using Open Big Data to Build and Analyze Urban Bus Network Models within and across Administrations., , , and . Complex., (2020)