Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RAPPER: Ransomware Prevention via Performance Counters., , , and . CoRR, (2018)HARDY: Hardware based Analysis for malwaRe Detection in embedded sYstems., , , , , and . SoCC, page 1-6. IEEE, (2020)A 0.16pJ/bit recurrent neural network based PUF for enhanced machine learning attack resistance., , , , and . ASP-DAC, page 627-632. ACM, (2019)Birds of the Same Feather Flock Together: A Dual-Mode Circuit Candidate for Strong PUF-TRNG Functionalities., , , , and . IEEE Trans. Computers, 72 (6): 1636-1651 (June 2023)HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis., , , , and . CoRR, (2023)Side-Channel Assisted Malware Classifier with Gradient Descent Correction for Embedded Platforms., , , , and . PROOFS, volume 7 of Kalpa Publications in Computing, page 1-15. EasyChair, (2018)Deep Learning Based Diagnostics for Rowhammer Protection of DRAM Chips., , and . ATS, page 86-91. IEEE, (2019)IPA: an Instruction Profiling-Based Micro-architectural Side-Channel Attack on Block Ciphers., , , , and . J. Hardw. Syst. Secur., 3 (1): 26-44 (2019)Tackling the Time-Defence: An Instruction Count Based Micro-architectural Side-Channel Attack on Block Ciphers., , and . SPACE, volume 10662 of Lecture Notes in Computer Science, page 30-52. Springer, (2017)How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?, and . CoRR, (2018)