From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Benchmark of DNN Model Search at Deployment Time., , , , , и . SSDBM, стр. 10:1-10:12. ACM, (2022)Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications., и . IEEE Des. Test, 34 (4): 26-33 (2017)A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange., , , , , , и . IACR Cryptol. ePrint Arch., (2021)Hardware IP Protection against Confidentiality Attacks and Evolving Role of CAD Tool., , , , , , и . ICCAD, стр. 25:1-25:8. ACM, (2022)Serving Deep Learning Models with Deduplication from Relational Databases., , , , , , и . Proc. VLDB Endow., 15 (10): 2230-2243 (2022)POWERT Channels: A Novel Class of Covert CommunicationExploiting Power Management Vulnerabilities., , , , и . HPCA, стр. 291-303. IEEE, (2019)A BIST-based Dynamic Obfuscation Scheme for Resilience against Removal and Oracle-guided Attacks*., , , , , и . ITC, стр. 170-179. IEEE, (2021)ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch., , , , и . SPACE, том 11947 из Lecture Notes in Computer Science, стр. 159-175. Springer, (2019)