Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks., , , and . IOLTS, page 1-5. IEEE, (2022)Evidence of a Larger EM-Induced Fault Model., , , , and . CARDIS, volume 8968 of Lecture Notes in Computer Science, page 245-259. Springer, (2014)Luring Transferable Adversarial Perturbations for Deep Neural Networks., , and . IJCNN, page 1-8. IEEE, (2021)Experimental validation of a Bulk Built-In Current Sensor for detecting laser-induced currents., , , , , and . IOLTS, page 150-155. IEEE, (2015)Figure of Merits of 28nm Si Technologies for Implementing Laser Attack Resistant Security Dedicated Circuits., , , , and . ISVLSI, page 362-367. IEEE Computer Society, (2015)Fault Round Modification Analysis of the advanced encryption standard., , , , , and . HOST, page 140-145. IEEE Computer Society, (2012)CMOS/STT-MRAM Based Ascon LWC: a Power Efficient Hardware Implementation., , , , and . ICECS 2022, page 1-4. IEEE, (2022)Precise Spatio-Temporal Electromagnetic Fault Injections on Data Transfers., , , , and . FDTC, page 1-8. IEEE, (2019)Further Analysis of Laser-induced IR-drop., , , , and . ATS, page 91-96. IEEE, (2021)Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller., , , , , and . HOST, page 1-10. IEEE, (2019)