Borowczak, Mike
45  results:
Search for persons X
?
1

Power-Based Side-Channel Attacks on Program Control Flow wi..:

Robins, Andey ; Olguin, Stone ; Brown, Jarek..
Journal of Cybersecurity and Privacy.  3 (2023)  3 - p. 351-363 , 2023
 
?
2

Challenging Assumptions of Normality in AES s-Box Configura..:

Carper, Clay ; Olguin, Stone ; Brown, Jarek..
Journal of Cybersecurity and Privacy.  3 (2023)  4 - p. 844-857 , 2023
 
?
3

TP-NET: Training Privacy-Preserving Deep Neural Networks un..:

, In: 2022 IEEE International Symposium on Smart Electronic Systems (iSES),
Hu, Hui ; Gegax-Randazzo, Jessa ; Carper, Clay. - p. 439-444 , 2022
 
?
4

Transition Recovery Attack on Embedded State Machines Using..:

, In: 2022 IEEE 40th International Conference on Computer Design (ICCD),
Carper, Clay ; Robins, Andey ; Borowczak, Mike - p. 572-576 , 2022
 
?
5

Learning Privacy-Preserving Graph Convolutional Network wit..:

, In: Proceedings of the ACM Web Conference 2022,
Hu, Hui ; Cheng, Lu ; Vap, Jayden Parker. - p. 3552-3561 , 2022
 
?
8

S*FSMs for Reduced Information Leakage: Power Side Channel ..:

, In: Behavioral Synthesis for Hardware Security,
Borowczak, Mike ; Vemuri, Ranga - p. 319-342 , 2021
 
?
11

Secure and Resilient Swarms: Autonomous Decentralized Light..:

Wolf, Shaya ; Cooley, Rafer ; Fantl, Jason.
IEEE Consumer Electronics Magazine.  9 (2020)  4 - p. 34-40 , 2020
 
?
12

Adversarial Impacts on Autonomous Decentralized Lightweight..:

, In: 2019 IEEE International Smart Cities Conference (ISC2),
Wolf, Shaya ; Cooley, Rafer ; Borowczak, Mike - p. 160-166 , 2019
 
?
 
?
 
1-15