Author of the publication

Programmable EM Sensor Array for Golden-Model Free Run-Time Trojan Detection and Localization.

, , , , , and . DATE, page 1-6. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging EM Side-Channel Information to Detect Rowhammer Attacks., , , , , and . SP, page 729-746. IEEE, (2020)Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors., , , , and . SP, page 1440-1457. IEEE, (2022)Class-Based Deep Non-Negative Matrix Factorization Algorithm for Facial Image Representation., , , and . CIS, page 123-127. IEEE, (2021)Research on UUV Rudder Angle Control Method Based on Sliding Mode Control., , , , , and . BIC-TA (2), volume 2062 of Communications in Computer and Information Science, page 357-367. Springer, (2023)Optimizing Cabin Wireless Network Signal Coverage with Ray Tracing Method., , , , , and . BigDataSecurity/HPSC/IDS, page 204-209. IEEE, (2023)Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance., , , , and . SP (Workshops), page 312-322. IEEE, (2022)Reversible image processing via reversible data hiding., , , , , and . DSP, page 427-431. IEEE, (2016)Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices., , , , , and . SP, page 1246-1262. IEEE, (2022)VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger., , , , , and . USENIX Security Symposium, USENIX Association, (2024)BitJabber: The World's Fastest Electromagnetic Covert Channel., , and . HOST, page 35-45. IEEE, (2020)