Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Securely Record Logs based on ARM TrustZone., , , and . AsiaCCS, page 664-666. ACM, (2019)Protecting HRP UWB Ranging System Against Distance Reduction Attacks., , , and . CCS, page 622-635. ACM, (2023)End-to-end 6G Terahertz Wireless Platform with Adaptive Transmit and Receive Beamforming., , , , , , , , , and 4 other author(s). ICC Workshops, page 897-903. IEEE, (2022)End-to-end 140 GHz Wireless Link Demonstration with Fully-Digital Beamformed System., , , , , , , , , and 4 other author(s). ICC Workshops, page 1-6. IEEE, (2021)Recovering Yaw Rate from Signal Injection Attack to Protect RV's Direction., , , and . WISA, volume 13720 of Lecture Notes in Computer Science, page 171-184. Springer, (2022)Cost-based join processing scheme in a hybrid RDBMS and hive system., , , , and . BigComp, page 160-164. IEEE Computer Society, (2014)Cybersecurity and Capacity Requirement for Data Storage of Autonomous Driving System., , , and . VTC Fall, page 1-7. IEEE, (2022)RIDAS: Real-time identification of attack sources on controller area networks., , , , , and . USENIX Security Symposium, page 6911-6928. USENIX Association, (2023)Implantable Neural-Recording Modules for Monitoring Electrical Neural Activity in the Central and Peripheral Nervous Systems., , , and . MWSCAS, page 533-536. IEEE, (2020)Usable User Authentication on a Smartwatch using Vibration., , and . CCS, page 304-319. ACM, (2021)