Mukhtar, Naila
62  results:
Search for persons X
?
 
?
 
?
 
?
6

Fake It Till You Make It: Data Augmentation Using Generativ..:

, In: Topics in Cryptology – CT-RSA 2022; Lecture Notes in Computer Science,
Mukhtar, Naila ; Batina, Lejla ; Picek, Stjepan. - p. 297-321 , 2022
 
?
8

Machine-Learning Assisted Side-Channel Attacks on RNS ECC I..:

, In: Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science,
 
?
 
?
12

Power Side-Channel Analysis of RNS GLV ECC Using Machine an..:

Mehrabi, Mohamad Ali ; Mukhtar, Naila ; Jolfaei, Alireza
ACM Transactions on Internet Technology (TOIT).  21 (2021)  3 - p. 1-20 , 2021
 
?
13

Edge enhanced deep learning system for IoT edge device secu..:

Mukhtar, Naila ; Mehrabi, Ali ; Kong, Yinan.
Concurrency and Computation: Practice and Experience.  35 (2021)  13 - p. , 2021
 
?
15

On features suitable for power analysis — Filtering the con..:

, In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS),
Mukhtar, Naila ; Kong, Yinan - p. 1-6 , 2018
 
1-15