Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
6
DMA'n'Play: Practical Remote Attestation Based on Direct Me..:
, In:
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
7
Unleashing IoT Security: Assessing the Effectiveness of Bes..:
, In:
?
2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD) ,
8
PSOFuzz: Fuzzing Processors with Particle Swarm Optimizatio:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
9
BayBFed: Bayesian Backdoor Defense for Federated Learning:
, In:
?
Proceedings of the 15th ACM Web Science Conference 2023 ,
10
Follow Us and Become Famous! Insights and Guidelines From I..:
, In:
?
2023 33rd International Conference on Field-Programmable Logic and Applications (FPL) ,
11
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Feder..:
, In:
?
Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
15