From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CryptoImg: Privacy preserving processing over encrypted images., , , и . CNS, стр. 570-575. IEEE, (2016)Dynamic FPGA Detection and Protection of Hardware Trojan: A Comparative Analysis., , , , и . CoRR, (2017)Safe Reinforcement Learning using Data-Driven Predictive Control., , , , и . ICCSPA, стр. 1-6. IEEE, (2022)Privacy-aware quadratic optimization using partially homomorphic encryption., , , , , , и . CDC, стр. 5053-5058. IEEE, (2016)SeleCon: Scalable IoT Device Selection and Control Using Hand Gestures., , , , и . IoTDI, стр. 47-58. ACM, (2017)Hardware Trojan Protection for Third Party IPs., , , и . DSD, стр. 662-665. IEEE Computer Society, (2013)Robust data-driven predictive control of unknown nonlinear systems using reachability analysis., , , , и . Eur. J. Control, (ноября 2023)Homomorphic Data Isolation for Hardware Trojan Protection., , , , и . ISVLSI, стр. 131-136. IEEE Computer Society, (2015)E-Voting Attacks and Countermeasures., , , , и . AINA Workshops, стр. 269-274. IEEE Computer Society, (2014)D-SLATS: Distributed Simultaneous Localization and Time Synchronization., , , , , , и . MobiHoc, стр. 14:1-14:10. ACM, (2017)