Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensor Security: Current Progress, Research Challenges, and Future Roadmap., and . CoRR, (2022)Hierarchical Temporal Memory-Based One-Pass Learning for Real-Time Anomaly Detection and Simultaneous Data Prediction in Smart Grids., , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1770-1782 (2022)SELF-CARE: Selective Fusion with Context-Aware Low-Power Edge Computing for Stress Detection., , and . DCOSS, page 49-52. IEEE, (2022)CFG2VEC: Hierarchical Graph Neural Network for Cross-Architectural Software Reverse Engineering., , , , , and . ICSE-SEIP, page 281-291. IEEE, (2023)Special Session: Noninvasive Sensor-Spoofing Attacks on Embedded and Cyber-Physical Systems., and . ICCD, page 45-48. IEEE, (2020)LENS: Layer Distribution Enabled Neural Architecture Search in Edge-Cloud Hierarchies., , , and . DAC, page 403-408. IEEE, (2021)Acoustic Side Channel Attack Against DNA Synthesis Machines: Poster Abstract., , , , , , and . ICCPS, page 186-187. IEEE, (2020)LLM4PLC: Harnessing Large Language Models for Verifiable Programming of PLCs in Industrial Control Systems., , , , , and . ICSE-SEIP, page 192-203. ACM, (2024)Testudo: Collaborative Intelligence for Latency-Critical Autonomous Systems., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (6): 1770-1783 (June 2023)Physical Layer Key Generation: Securing Wireless Communication in Automotive Cyber-Physical Systems., , and . ACM Trans. Cyber Phys. Syst., 3 (2): 13:1-13:26 (2019)