Search for persons
X
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
2
Unleashing IoT Security: Assessing the Effectiveness of Bes..:
, In:
?
2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) ,
3
PSOFuzz: Fuzzing Processors with Particle Swarm Optimizatio:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
4
BayBFed: Bayesian Backdoor Defense for Federated Learning:
, In:
?
Proceedings of the 15th ACM Web Science Conference 2023 ,
5
Follow Us and Become Famous! Insights and Guidelines From I..:
, In:
?
2023 33rd International Conference on Field-Programmable Logic and Applications (FPL) ,
6
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Feder..:
, In:
?
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
10
Wireless and Mobile Security Research and Teaching in the P..:
, In:
?
25th International Symposium on Research in Attacks, Intrusions and Defenses ,
11
RiscyROP: Automated Return-Oriented Programming Attacks on ..:
, In:
?
2022 IEEE Aerospace Conference (AERO) ,
12
TruSat: Building Cyber Trust in Collaborative Spacecraft Ne..:
, In:
?
Proceedings of the 59th ACM/IEEE Design Automation Conference ,
13
VirTEE : a full backward-compatible TEE with native live..:
, In:
?
Proceedings of the 59th ACM/IEEE Design Automation Conference ,
14
Trusting the trust anchor : towards detecting cross-laye..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
15