Author of the publication

Supervised and unsupervised machine learning for side-channel based Trojan detection.

, , and . ASAP, page 17-24. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks., , , , and . IACR Cryptol. ePrint Arch., (2020)Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery., , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (2): 166-191 (2022)Traditional Machine Learning Methods for Side-Channel Analysis., , , and . Security and Artificial Intelligence, (2022)On Implementation-Level Security of Edge-Based Machine Learning Models., , , , and . Security and Artificial Intelligence, (2022)Extraction of Binarized Neural Network Architecture and Secret Parameters Using Side-Channel Information., , , , and . ISCAS, page 1-5. IEEE, (2021)Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm., , , , , and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 93-105. Springer, (2020)Using Model Optimization as Countermeasure against Model Recovery Attacks., and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 196-209. Springer, (2023)A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks., , , and . CSCML, volume 13914 of Lecture Notes in Computer Science, page 296-306. Springer, (2023)On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers., , , , and . APCCAS, page 552-555. IEEE, (2018)Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks., , , and . ACM Conference on Computer and Communications Security, page 2657-2659. ACM, (2019)