Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LAWN: boosting the performance of NVMM file system through reducing write amplification., and . DAC, page 6:1-6:6. ACM, (2018)Physical Adversarial Attack on a Robotic Arm., , , and . IEEE Robotics Autom. Lett., 7 (4): 9334-9341 (2022)Exposing Backdoors in Robust Machine Learning Models., , , and . CoRR, (2020)A modified PKM environment for the security enhancement of IEEE 802.16e., and . Comput. Stand. Interfaces, (2019)STITCHER: Correlating Digital Forensic Evidence on Internet-of-Things Devices., , and . CoRR, (2020)Precise micro-architectural modeling for WCET analysis via AI+SAT., , and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 87-96. IEEE Computer Society, (2013)Learning Fault Models of Cyber Physical Systems., , and . ICFEM, volume 12531 of Lecture Notes in Computer Science, page 147-162. Springer, (2020)BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing., , , , and . USENIX Security Symposium, page 1025-1042. USENIX Association, (2022)Poster: Distribution-aware Fairness Test Generation., , , and . ICSE Companion, page 322-323. IEEE, (2023)Distribution-aware fairness test generation., , , and . J. Syst. Softw., (2024)