From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Trojan-invalidating Circuit Based on Signal Transitions and Its FPGA Implementation., , и . ISCAS, стр. 1-5. IEEE, (2018)FPGA-based Heterogeneous Solver for Three-Dimensional Routing., , , , , и . ASP-DAC, стр. 11-12. IEEE, (2020)Automating XSS Vulnerability Testing Using Reinforcement Learning., , и . ICISSP, стр. 70-80. SciTePress, (2023)Initial Seeds Generation Using LLM for IoT Device Fuzzing., , , , , , и . IOTSMS, стр. 5-10. IEEE, (2024)Vulnerability Information Sharing Platform for Securing Hardware Supply Chains., , , , , , и . ICISSP, стр. 403-410. SCITEPRESS, (2024)Hardware Trojans classification for gate-level netlists using multi-layer neural networks., , и . IOLTS, стр. 227-232. IEEE, (2017)Implementation of a ROS-Based Autonomous Vehicle on an FPGA Board., , , , , и . FPT, стр. 457-460. IEEE, (2019)Membership Inference Attacks against GNN-based Hardware Trojan Detection., , , , , и . TrustCom, стр. 1222-1229. IEEE, (2023)An Anomalous Behavior Detection Method for IoT Devices by Extracting Application-Specific Power Behaviors., , , и . IOLTS, стр. 1-4. IEEE, (2020)AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning., , и . CODASPY, стр. 325-336. ACM, (2024)