Author of the publication

Mitigating Adversarial Attacks for Deep Neural Networks by Input Deformation and Augmentation.

, , , , , and . ASP-DAC, page 157-162. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies., , , and . CCS, page 195-209. ACM, (2019)Overtake: Achieving Meltdown-type Attacks with One Instruction., , , , , , , and . AsianHOST, page 1-6. IEEE, (2023)Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit., , , , , , , and . HPCA, page 31-45. IEEE, (2024)Directional Residual Frame: Turns the motion information into a static RGB frame (S)., , , , and . DMSVIVA, page 32-37. KSI Research Inc., (2023)Auto-Encoding GAN for Reducing Mode Collapse and Enhancing Feature Representation., , , , and . SEKE, page 306-311. KSI Research Inc., (2022)DVFSspy: Using Dynamic Voltage and Frequency Scaling as a Covert Channel for Multiple Procedures., , , and . ASP-DAC, page 654-659. IEEE, (2022)PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions., , , , , , , and . AsianHOST, page 1-6. IEEE, (2022)Robust Spatio-Temporal Trajectory Modeling Based on Auto-Gated Recurrent Unit., , , , , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1189-1194. IEEE, (2022)Physical unclonable functions-based linear encryption against code reuse attacks., , , , , , and . DAC, page 75:1-75:6. ACM, (2016)SCAFinder: Formal Verification of Cache Fine-Grained Features for Side Channel Detection., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)