Author of the publication

PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications.

, , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3299-3316 (July 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Circuit Aging on Accuracy Degradation of Deep Neural Network Accelerator., and . ISCAS, page 1-5. IEEE, (2019)Vulnerability Analysis on Noise-Injection Based Hardware Attack on Deep Neural Networks., , and . AsianHOST, page 1-6. IEEE, (2019)An Inductively Filtered Multiwinding Rectifier Transformer and Its Application in Industrial DC Power Supply System., , , , , , , , , and 1 other author(s). IEEE Trans. Ind. Electron., 63 (7): 3987-3997 (2016)Deep Texture-Depth-Based Attention for Face Recognition on IoT Devices., , and . APCCAS, page 1-5. IEEE, (2022)Inconspicuous Data Augmentation Based Backdoor Attack on Deep Neural Networks., , , , and . SOCC, page 1-6. IEEE, (2022)Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch Injection., , , and . DAC, page 1-6. IEEE, (2020)A fast online sequential learning accelerator for IoT network intrusion detection: work-in-progress., , , and . CODES+ISSS, page 18:1-18:2. ACM, (2017)A Lightweight PUF-based Secure Group Key Agreement Protocol for Wireless Sensor Networks., , and . ISCAS, page 1-5. IEEE, (2023)A Forward Error Compensation Approach for Fault Resilient Deep Neural Network Accelerator Design., and . ASHES@CCS, page 41-50. ACM, (2021)Stealthy and Robust Glitch Injection Attack on Deep Learning Accelerator for Target With Variational Viewpoint., , and . IEEE Trans. Inf. Forensics Secur., (2021)