From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cumulative Message Authentication Codes for Resource-Constrained Networks., , , и . CNS, стр. 1-9. IEEE, (2020)Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters., , , и . DySPAN, стр. 1-10. IEEE, (2018)BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy., , , , , , и . WOOT @ USENIX Security Symposium, USENIX Association, (2020)Exposing New Vulnerabilities of Error Handling Mechanism in CAN., , , , и . USENIX Security Symposium, стр. 4241-4258. USENIX Association, (2021)Evading Voltage-Based Intrusion Detection on Automotive CAN., , , , , и . NDSS, The Internet Society, (2021)Practical Attestation for Edge Devices Running Compute Heavy Machine Learning Applications., , и . ACSAC, стр. 323-336. ACM, (2021)ZBCAN: A Zero-Byte CAN Defense System., , , , , , и . USENIX Security Symposium, стр. 6893-6910. USENIX Association, (2023)BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks., , , , и . RAID, стр. 397-411. USENIX Association, (2020)SpotOn: Adversarially Robust Keyword Spotting on Resource-Constrained IoT Platforms., , и . AsiaCCS, ACM, (2024)Physical layer authentication using controlled inter symbol interference., , , и . DySPAN, стр. 286. IEEE, (2012)