Author of the publication

Hardening Embedded Networking Devices Against Side-Channel Attacks.

, and . Ad Hoc & Sensor Wireless Networks, 12 (1-2): 103-124 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Embedded connectivity of recursive networks., , , and . Theor. Comput. Sci., (2016)Resilient Cluster Leader Election for Wireless Sensor Networks., and . SECON, page 1-9. IEEE, (2009)Spaced Learning Enhances Subsequent Recognition Memory by Reducing Neural Repetition Suppression., , , , , and . J. Cognitive Neuroscience, 23 (7): 1624-1633 (2011)Corrigendum to "Native language experience shapes neural basis of addressed and assembled phonologies" Neuroimage 114 (2015) 38-48., , , , , , , and . NeuroImage, (2017)The contribution of the left mid-fusiform cortical thickness to Chinese and English reading in a large Chinese sample., , , , , , , , , and . NeuroImage, (2013)Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis., , , , and . MMM-ACNS, volume 10446 of Lecture Notes in Computer Science, page 247-259. Springer, (2017)Position Paper: A Theoretical Framework for General Cognition Evaluation of Cognitive Radios., , , and . ISC2, page 1-8. IEEE, (2018)Class Rectification Hard Mining for Imbalanced Deep Learning., , and . ICCV, page 1869-1878. IEEE Computer Society, (2017)Time Varying Channel Tracking for Multi-UAV Wideband Communications with Beam Squint., , , , and . CoRR, (2019)Speed-Up Algorithms for Happiness-Maximizing Representative Databases., , , and . APWeb/WAIM Workshops, volume 11268 of Lecture Notes in Computer Science, page 321-335. Springer, (2018)