Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks., , , , and . IACR Cryptol. ePrint Arch., (2020)Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery., , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (2): 166-191 (2022)Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm., , , , , and . ACNS Workshops, volume 12418 of Lecture Notes in Computer Science, page 93-105. Springer, (2020)Using Model Optimization as Countermeasure against Model Recovery Attacks., and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 196-209. Springer, (2023)Traditional Machine Learning Methods for Side-Channel Analysis., , , and . Security and Artificial Intelligence, (2022)On Implementation-Level Security of Edge-Based Machine Learning Models., , , , and . Security and Artificial Intelligence, (2022)Extraction of Binarized Neural Network Architecture and Secret Parameters Using Side-Channel Information., , , , and . ISCAS, page 1-5. IEEE, (2021)A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks., , , and . CSCML, volume 13914 of Lecture Notes in Computer Science, page 296-306. Springer, (2023)A survey of the state-of-the-art fault attacks., and . ISIC, page 152-155. IEEE, (2014)Overview of machine learning based side-channel analysis methods., and . ISIC, page 38-41. IEEE, (2014)