Khasawneh, Khaled N
111  Ergebnisse:
Personensuche X
?
1

Hardware Support for Trustworthy Machine Learning: A Survey:

, In: 2024 25th International Symposium on Quality Electronic Design (ISQED),
 
?
2

Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing:

, In: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
He, Yaqi ; Zeng, Kai ; Jiao, Long.. - p. 196-206 , 2024
 
?
4

Stochastic-HMDs: Adversarial-Resilient Hardware Malware Det..:

, In: 2023 60th ACM/IEEE Design Automation Conference (DAC),
 
?
5

SecureVolt: Enhancing Deep Neural Networks Security via Und..:

Islam, Md Shohidul ; Alouani, Ihsen ; Khasawneh, Khaled N.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.  42 (2023)  12 - p. 4922-4933 , 2023
 
?
6

VPP: Privacy Preserving Machine Learning via Undervolting:

, In: 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
 
?
7

A Brain-inspired Approach for Malware Detection using Sub-s..:

, In: Proceedings of the Great Lakes Symposium on VLSI 2023,
 
?
8

ROOM: Adversarial Machine Learning Attacks Under Real-Time ..:

, In: 2022 International Joint Conference on Neural Networks (IJCNN),
 
?
9

Characterization of AES Implementations on Microprocessor-b..:

, In: 2022 IEEE Wireless Communications and Networking Conference (WCNC),
Roy, Sunanda ; Stavrou, Angelos ; Mark, Brian L.... - p. 55-60 , 2022
 
?
11

Secure and Energy-Efficient Proximity-Based Pairing for IoT..:

, In: 2022 IEEE Globecom Workshops (GC Wkshps),
He, Yaqi ; Zeng, Kai ; Mark, Brian L.. - p. 1359-1364 , 2022
 
?
12

Defensive approximation: securing CNNs using approximate co..:

, In: Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems,
Guesmi, Amira ; Alouani, Ihsen ; Khasawneh, Khaled N.... - p. 990-1003 , 2021
 
?
14

The Evolution of Transient-Execution Attacks:

, In: Proceedings of the 2020 on Great Lakes Symposium on VLSI,
 
?
15

Evolution of Defenses against Transient-Execution Attacks:

, In: Proceedings of the 2020 on Great Lakes Symposium on VLSI,
 
1-15