Author of the publication

Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators.

, , , and . AsianHOST, page 62-67. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pseudo-Random Number Generator Based on Logistic Chaotic System., and . Entropy, 21 (10): 960 (2019)Automated deep learning-based wide-band receiver., , , , , , , , , and 3 other author(s). Comput. Networks, (2022)Generalized Compute-Compress-and-Forward., , and . IEEE Trans. Inf. Theory, 65 (1): 462-481 (2019)Human Posture Recognition Based On Convolutional Neural Network., and . EITCE, page 475-480. ACM, (2020)Real-Time AI-Enabled CSI Feedback Experimentation with Open RAN., , , , , , and . WONS, page 121-124. IEEE, (2024)Hercules: An Emulation-Based Framework for Transport Layer Measurements over 5G Wireless Networks., , , , , , , , and . WiNTECH@MOBICOM, page 72-79. ACM, (2023)Design and Realization of Image Encryption System Based on Compound Logistic Chaotic System., , , and . RVSP, page 75-77. IEEE Computer Society, (2015)Cross-modal pedestrian re-recognition based on attention mechanism., , , and . Vis. Comput., 40 (4): 2405-2418 (April 2024)Compute-Compress-and-Forward: New Results., , and . GLOBECOM, page 1-6. IEEE, (2017)Improving transferability of adversarial examples with powerful affine-shear transformation attack., , and . Comput. Stand. Interfaces, (2023)