From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of Swarm Intelligence Based ANN Algorithms for Attacking PUFs., , и . IEEE Access, (2021)Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures., , и . ACM J. Emerg. Technol. Comput. Syst., 17 (3): 36:1-36:20 (2021)Analysis and Machine Learning Vulnerability Assessment of XOR-Inverter based Ring Oscillator PUF Design., , и . MWSCAS, стр. 590-593. IEEE, (2019)Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security., , , , , , , и . IEEE Access, (2021)Defense Mechanism Vulnerability Analysis of Ring Oscillator PUFs Against Neural Network Modeling Attacks using the Dragonfly Algorithm., и . EIT, стр. 378-382. IEEE, (2020)Mobile Devices or Head-Mounted Displays: A Comparative Review and Analysis of Augmented Reality in Healthcare., , , и . IEEE Access, (2024)Enhancing Cybersecurity: A Pipeline Approach for Efficient Machine Learning Intrusion Detection., , и . UEMCON, стр. 495-501. IEEE, (2023)Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication., , , , , , , и . IoTSMS, стр. 405-411. IEEE, (2019)PUF-Based Authentication for the Security of IoT Devices., и . eIT, стр. 67-70. IEEE, (2023)Design of a Delay-Based FPGA PUF Resistant to Machine Learning Attacks., и . MWSCAS, стр. 865-868. IEEE, (2021)