Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware-based Detection of Malicious Firmware Modification in Microgrids., , , , and . VLSID, page 186-191. IEEE, (2024)Analyzing the Efficiency of Machine Learning Classifiers in Hardware-Based Malware Detectors., , and . ISVLSI, page 452-457. IEEE, (2020)Hardware-Assisted Detection of Firmware Attacks in Inverter-Based Cyberphysical Microgrids., , , and . CoRR, (2020)Hardware-assisted Detection of Malware in Automotive-Based Systems., , and . DATE, page 1763-1768. IEEE, (2021)Hardware Performance Counters: Ready-Made vs Tailor-Made., , , and . ACM Trans. Embed. Comput. Syst., 20 (5s): 65:1-65:26 (2021)Real-Time Hardware-Based Malware and Micro-Architectural Attack Detection Utilizing CMOS Reservoir Computing., , , and . IEEE Trans. Circuits Syst. II Express Briefs, 69 (2): 349-353 (2022)Defending Hardware-Based Malware Detectors Against Adversarial Attacks., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (9): 1727-1739 (2021)ND-HMDs: Non-Differentiable Hardware Malware Detectors against Evasive Transient Execution Attacks., , , and . ICCD, page 537-544. IEEE, (2020)Explainable Machine Learning for Intrusion Detection via Hardware Performance Counters., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (11): 4952-4964 (2022)Design and Logic Synthesis of a Scalable, Efficient Quantum Number Theoretic Transform., , , , and . ISLPED, page 5:1-5:6. ACM, (2022)