Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SNR-Centric Power Trace Extractors for Side-Channel Attacks., , , , , and . IACR Cryptology ePrint Archive, (2019)A Novel Method for Specific Emitter Identification Based on Singular Spectrum Analysis., , , and . WCNC, page 1-6. IEEE, (2017)A Scale Balanced Loss for Bounding Box Regression., , , , , , , and . IEEE Access, (2020)SNR-Centric Power Trace Extractors for Side-Channel Attacks., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (4): 620-632 (2021)Group Collision Attack., , , and . IEEE Trans. Inf. Forensics Secur., 14 (4): 939-953 (2019)An Efficient Anomaly Detection Framework for Electromagnetic Streaming Data., , , , and . ICBDC, page 151-155. ACM, (2019)On Eliminating Blocking Interference of RFID Unauthorized Reader Detection., , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 591-602. Springer, (2022)DMalNet: Dynamic malware analysis based on API feature engineering and graph learning., , , , , , , and . Comput. Secur., (2022)Towards Optimal Pre-processing in Leakage Detection., , , and . IACR Cryptol. ePrint Arch., (2017)Manifold Learning Towards Masking Implementations: A First Study., , , , and . IACR Cryptol. ePrint Arch., (2017)