Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architectural Support for Securing Systems Against Software Vulnerabilities.. University of California, Riverside, USA, (2019)The Evolution of Transient-Execution Attacks., , and . ACM Great Lakes Symposium on VLSI, page 163-168. ACM, (2020)ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints., , , and . IJCNN, page 1-10. IEEE, (2022)Characterization of AES Implementations on Microprocessor-based IoT Devices., , , , , and . WCNC, page 55-60. IEEE, (2022)Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks., , , , , , and . CoRR, (2022)Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks., , and . ICCAD, page 1-9. IEEE, (2021)Evolution of Defenses against Transient-Execution Attacks., , , and . ACM Great Lakes Symposium on VLSI, page 169-174. ACM, (2020)Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud., , , , , , and . SEED, page 1-13. IEEE, (2021)Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks., , , , , , , and . NDSS, The Internet Society, (2022)Imitating Functional Operations for Mitigating Side-Channel Leakage., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (4): 868-881 (2022)