Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Fault Attack on ITUbee Block Cipher., , , , and . ACM Trans. Embed. Comput. Syst., 16 (2): 54:1-54:10 (2017)Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts., , , , , , , , , and . CoRR, (2021)An Efficient MLP-based Point-guided Segmentation Network for Ore Images with Ambiguous Boundary., , , , , , , and . CoRR, (2024)SAM Meets Robotic Surgery: An Empirical Study in Robustness Perspective., , , , and . CoRR, (2023)Towards Effective Multi-Task Interaction for Entity-Relation Extraction: A Unified Framework with Selection Recurrent Network., , , and . CoRR, (2022)Analysis of Software Implemented Low Entropy Masking Schemes., , , and . Secur. Commun. Networks, (2018)Side-Channel Attack on a Protected RFID Card., , , , , , and . IEEE Access, (2018)Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing., , , , , and . IEEE Access, (2019)A Data-Driven Study of DDoS Attacks and Their Dynamics., , , and . IEEE Trans. Dependable Secur. Comput., 17 (3): 648-661 (2020)Efficient collision attacks on smart card implementations of masked AES., , , , , , and . Sci. China Inf. Sci., 58 (5): 1-15 (2015)