Author of the publication

Detecting Zero-day Controller Hijacking Attacks on the Power-Grid with Enhanced Deep Learning.

, , , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Bad is Suboptimal Rate Allocation?, , , and . INFOCOM, page 321-325. IEEE, (2008)Integration of butterfly and inverse butterfly nets in embedded processors: Effects on power saving., , , , and . ACSCC, page 1457-1459. IEEE, (2012)Rapid single-chip secure processor prototyping on the OpenSPARC FPGA platform., , , , , , , and . International Symposium on Rapid System Prototyping, page 38-44. IEEE, (2011)Subword parallelism with MAX-2.. IEEE Micro, 16 (4): 51-59 (1996)Guest Editorial: Media processing: a new design target., and . IEEE Micro, 16 (4): 6-9 (1996)A framework for testing hardware-software security architectures., , , and . ACSAC, page 387-397. ACM, (2010)Processor Architecture for Trustworthy Computers.. Asia-Pacific Computer Systems Architecture Conference, volume 3740 of Lecture Notes in Computer Science, page 1-2. Springer, (2005)Security basics.. Hot Chips Symposium, page 1-32. IEEE, (2014)Privacy-preserving Machine Learning through Data Obfuscation., , and . CoRR, (2018)CloudShield: Real-time Anomaly Detection in the Cloud., and . CoRR, (2021)