Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Future Large-Scale Memristive Device Crossbar Arrays: Limits Imposed by Sneak-Path Currents on Read Operations., , , , and . CoRR, (2015)PUF-FSM: A Controlled Strong PUF., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 37 (5): 1104-1108 (2018)Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality., , , and . IACR Cryptology ePrint Archive, (2015)SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh., , , , , , , , , and . CoRR, (2021)MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World., , , , , , , , and . CoRR, (2022)MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning., , , , , , , and . CoRR, (2022)A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM., , , , , , , and . CoRR, (2022)NTD: Non-Transferability Enabled Backdoor Detection., , , , , , , , and . CoRR, (2021)DeepTheft: Stealing DNN Model Architectures through Power Side Channel., , , , , , , , and . CoRR, (2023)Vertical Federated Learning: Taxonomies, Threats, and Prospects., , , , , , , and . CoRR, (2023)