Author of the publication

Matched-Filter and Correlation-Based Imaging for Fast Moving Objects Using a Sparse Network of Receivers.

, , , and . SIAM J. Imaging Sci., 10 (4): 2165-2216 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extraction of intrinsic structure for Hardware Trojan detection., , and . IACR Cryptology ePrint Archive, (2015)Pelvic motion implementation on the WalkTrainer., , , , , and . ROBIO, page 133-138. IEEE, (2007)Pelvic motion measurement during over ground walking, analysis and implementation on the WalkTrainer reeducation device., , , , , , , and . IROS, page 2362-2367. IEEE, (2008)Correlation-based imaging of fast moving objects using a sparse network of passive receivers., , , and . ACSSC, page 1618-1622. IEEE, (2018)An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification., , and . IEEE Trans. Very Large Scale Integr. Syst., 25 (12): 3317-3330 (2017)Under the Dome: Preventing Hardware Timing Information Leakage., , , and . CARDIS, volume 13173 of Lecture Notes in Computer Science, page 233-253. Springer, (2021)Matched-Filter and Correlation-Based Imaging for Fast Moving Objects Using a Sparse Network of Receivers., , , and . SIAM J. Imaging Sci., 10 (4): 2165-2216 (2017)Adaptive Masking: a Dynamic Trade-off between Energy Consumption and Hardware Security., , , , and . ICCD, page 559-566. IEEE, (2019)Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software., , and . IACR Cryptology ePrint Archive, (2018)Practical Algebraic Side-Channel Attacks Against ACORN., , and . IACR Cryptology ePrint Archive, (2019)