Author of the publication

Exploitations of wireless interfaces via network scanning.

, , and . ICNC, page 937-941. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation., , , , , and . CoRR, (2018)Fairness-Guaranteed DER Coordination Under False Data Injection Attacks., , , and . IEEE Internet Things J., 10 (21): 19043-19053 (November 2023)A 22-nm 1-Mb 1024-b Read Data-Protected STT-MRAM Macro With Near-Memory Shift-and-Rotate Functionality and 42.6-GB/s Read Bandwidth for Security-Aware Mobile Device., , , , , , , , , and 7 other author(s). IEEE J. Solid State Circuits, 57 (6): 1936-1949 (2022)Adaptive Sampling and Quick Anomaly Detection in Large Networks., , , , and . IEEE Trans Autom. Sci. Eng., 20 (4): 2253-2267 (October 2023)Security Oriented Design Framework for EM Side-Channel Protection in RTL Implementations., , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (8): 2421-2434 (2022)Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers., , , , and . CoRR, (2021)Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part I: Framework Fundamentals., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (10): 2416-2429 (2017)Hardware Trojans in Wireless Cryptographic ICs., and . IEEE Des. Test Comput., 27 (1): 26-35 (2010)virtCCA: Virtualized Arm Confidential Compute Architecture with TrustZone., , , , , and . CoRR, (2023)PCBench: Benchmarking of Board-Level Hardware Attacks and Trojans., , , and . ASP-DAC, page 396-401. ACM, (2021)