Author of the publication

Hardware-based attacks to compromise the cryptographic security of an election system.

, , , , and . ICCD, page 153-156. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware-based workload forensics: Process reconstruction via TLB monitoring., and . HOST, page 167-172. IEEE Computer Society, (2016)Hardware-assisted rootkit detection via on-line statistical fingerprinting of process execution., and . DATE, page 1580-1585. IEEE, (2018)Mat_peptide: comprehensive annotation of mature peptides from polyproteins in five virus families., , , , , , , , , and . Bioinform., 36 (5): 1627-1628 (2020)Visible Light Intelligent Inspection of Transmission Line UAV Based on Machine Vision., , , , and . CIPAE, page 504-507. IEEE, (2023)Hardware-based Real-time Workload Forensics via Frame-level TLB Profiling., , and . VTS, page 1-6. IEEE, (2019)Analytical Co-Design of Receding Horizon Estimation and Control for Power Converters., and . IEEE Trans. Control. Syst. Technol., 32 (4): 1520-1527 (July 2024)SEdb 2.0: a comprehensive super-enhancer database of human and mouse., , , , , , , , , and 7 other author(s). Nucleic Acids Res., 51 (D1): 280-290 (January 2023)Deep Adaptively Feature Extracting Network for Cervical Squamous Lesion Cell Detection., , , , , , and . ML4CS (2), volume 13656 of Lecture Notes in Computer Science, page 238-253. Springer, (2022)Chinese Stylistic Competence: Evaluation Method and Datasets of Large Language Model's Performance., and . IALP, page 271-277. IEEE, (2023)Soft Robotic Hand for Sushi Grasping and Handling., , , and . SII, page 1-7. IEEE, (2023)