Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RAPPER: Ransomware Prevention via Performance Counters., , , and . CoRR, (2018)PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function., , , , and . CoRR, (2021)Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks., , , and . IACR Cryptol. ePrint Arch., (2017)A 0.16pJ/bit recurrent neural network based PUF for enhanced machine learning attack resistance., , , , and . ASP-DAC, page 627-632. ACM, (2019)HARDY: Hardware based Analysis for malwaRe Detection in embedded sYstems., , , , , and . SoCC, page 1-6. IEEE, (2020)Tackling the Time-Defence: An Instruction Count Based Micro-architectural Side-Channel Attack on Block Ciphers., , and . SPACE, volume 10662 of Lecture Notes in Computer Science, page 30-52. Springer, (2017)How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?, and . CoRR, (2018)IPA: an Instruction Profiling-Based Micro-architectural Side-Channel Attack on Block Ciphers., , , , and . J. Hardw. Syst. Secur., 3 (1): 26-44 (2019)NN-Lock: A Lightweight Authorization to Prevent IP Threats of Deep Learning Models., , , and . ACM J. Emerg. Technol. Comput. Syst., 18 (3): 51:1-51:19 (2022)Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning., , and . CoRR, (2023)