Author of the publication

Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks.

, , , , , and . DATE, page 776-781. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Rafatirad, Setareh
add a person with the name Rafatirad, Setareh
 

Other publications of authors with the same name

Contextual Augmentation of Ontology for Recognizing Sub-events., and . ICSC, page 546-553. IEEE Computer Society, (2011)Programmable Gates Using Hybrid CMOS-STT Design to Prevent IC Reverse Engineering., , , , , and . ACM Trans. Design Autom. Electr. Syst., 23 (6): 76:1-76:21 (2018)Mitigating the Performance and Quality of Parallelized Compressive Sensing Reconstruction Using Image Stitching., , , , , , and . ACM Great Lakes Symposium on VLSI, page 219-224. ACM, (2019)Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design., , , , , , , , and . CoRR, (2019)Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks., , , , , and . DATE, page 776-781. IEEE, (2019)XPPE: cross-platform performance estimation of hardware accelerators using machine learning., , , , , and . ASP-DAC, page 727-732. ACM, (2019)Advances and throwbacks in hardware-assisted security: special session., , , , , , , , , and 1 other author(s). CASES, page 15:1-15:10. ACM, (2018)Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning., , , , and . CF, page 212-215. ACM, (2018)System and Architecture Level Characterization of Big Data Applications on Big and Little Core Server Architectures., , and . ACM Trans. Model. Perform. Evaluation Comput. Syst., 3 (3): 14:1-14:32 (2018)Efficient utilization of adversarial training towards robust machine learners and its analysis., , , and . ICCAD, page 78. ACM, (2018)