Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-., , , , , , , , , and 9 other author(s). ICCAD, page 141:1-141:6. IEEE, (2020)PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community., , , , , , , and . ETS, page 1-10. IEEE, (2020)On the Performance of Non-Profiled Differential Deep Learning Attacks against an AES Encryption Algorithm Protected using a Correlated Noise Generation based Hiding Countermeasure., , , , and . DATE, page 614-617. IEEE, (2020)Physical Layer Key Generation in 5G Wireless Networks., , , , , and . CoRR, (2019)Intelligence Measure of Cognitive Radios with Learning Capabilities., , , , , and . GLOBECOM, page 1-6. IEEE, (2016)Multi-stage Deep Classifier Cascades for Open World Recognition., , , , , , and . CIKM, page 179-188. ACM, (2019)String Stability Analysis of Cooperative Adaptive Cruise Control under Jamming Attacks., , , and . HASE, page 157-162. IEEE Computer Society, (2017)Optimal Online Learning with Randomized Feedback Graphs with Application in PUE Attacks in CRN., , , , and . CoRR, (2017)Machine Learning-Based Delay-Aware UAV Detection Over Encrypted Wi-Fi Traffic., , , , , and . CNS, page 1-7. IEEE, (2019)Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead., , , , , and . IEEE Netw., 34 (6): 198-204 (2020)