From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing., , , , , и . IEEE Access, (2019)Side-Channel Attack on a Protected RFID Card., , , , , , и . IEEE Access, (2018)Instrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges., , , , и . SOSR, стр. 16:1-16:7. ACM, (2018)Efficient collision attacks on smart card implementations of masked AES., , , , , , и . Sci. China Inf. Sci., 58 (5): 1-15 (2015)A Data-Driven Study of DDoS Attacks and Their Dynamics., , , и . IEEE Trans. Dependable Secur. Comput., 17 (3): 648-661 (2020)Attention-based Relational Graph Convolutional Network for Target-Oriented Opinion Words Extraction., , и . EACL, стр. 1986-1997. Association for Computational Linguistics, (2021)Overcoming Significant Noise: Correlation-Template-Induction Attack., , , и . ISPEC, том 7232 из Lecture Notes in Computer Science, стр. 393-404. Springer, (2012)Attacking the Edge-of-Things: A Physical Attack Perspective., , , , , , и . IEEE Internet Things J., 9 (7): 5240-5253 (2022)Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks., , и . KSII Trans. Internet Inf. Syst., 7 (5): 1094-1107 (2013)Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts., , , , , , , , , и . CoRR, (2021)