Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensor Security: Current Progress, Research Challenges, and Future Roadmap., and . CoRR, (2022)Inter-Layer Scheduling Space Exploration for Multi-model Inference on Heterogeneous Chiplets., , and . CoRR, (2023)Technical Report for HW2VEC - A Graph Learning Tool for Automating Hardware Security., , , , and . CoRR, (2021)ERUDITE: Human-in-the-Loop IoT for an Adaptive Personalized Learning System., , and . CoRR, (2023)AHAR: Adaptive CNN for Energy-efficient Human Activity Recognition in Low-power Edge Devices., , and . CoRR, (2021)Report of the Fourth International Workshop on Design Automation for Cyber-Physical Systems (DACPS) 2019., and . IEEE Des. Test, 36 (6): 84-85 (2019)Hierarchical Temporal Memory-Based One-Pass Learning for Real-Time Anomaly Detection and Simultaneous Data Prediction in Smart Grids., , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1770-1782 (2022)SELF-CARE: Selective Fusion with Context-Aware Low-Power Edge Computing for Stress Detection., , and . DCOSS, page 49-52. IEEE, (2022)CFG2VEC: Hierarchical Graph Neural Network for Cross-Architectural Software Reverse Engineering., , , , , and . ICSE-SEIP, page 281-291. IEEE, (2023)Special Session: Noninvasive Sensor-Spoofing Attacks on Embedded and Cyber-Physical Systems., and . ICCD, page 45-48. IEEE, (2020)