Author of the publication

Work-in-Progress: Towards Evaluating CNNs Against Integrity Attacks on Multi-tenant Computation.

, , , and . CASES, page 7-8. ACM/IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of Multi-Agent Cyber-Physical Systems: A Survey., and . IEEE Access, (2022)SoCCom: Automated Synthesis of System-on-Chip Architectures., , , and . IEEE Trans. Very Large Scale Integr. Syst., 30 (4): 449-462 (2022)Guarding Deep Learning Systems With Boosted Evasion Attack Detection and Model Update., , , and . IEEE Internet Things J., 11 (6): 9382-9391 (March 2024)Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice., , , , , , and . J. Hardw. Syst. Secur., 2 (2): 97-110 (2018)SeVNoC: Security Validation of System-on-Chip Designs With NoC Fabrics., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (2): 672-682 (February 2023)Resilient Cooperative Adaptive Cruise Control for Autonomous Vehicles Using Machine Learning., , and . CoRR, (2021)Poster: Vehicle-to-Infrastructure Security for Reduced Speed Work Zone., , and . MobiHoc, page 571-573. ACM, (2023)Modeling and verification of industrial flash memories., , , and . ISQED, page 705-712. IEEE, (2010)Using ACL2 to Verify Loop Pipelining in Behavioral Synthesis., , , and . ACL2, volume 152 of EPTCS, page 111-128. (2014)Exploiting design-for-debug for flexible SoC security architecture., , and . DAC, page 167:1-167:6. ACM, (2016)