Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliable Physical Unclonable Functions Using Data Retention Voltage of SRAM Cells., , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 34 (6): 903-914 (2015)Transferable Adversarial Robustness using Adversarially Trained Autoencoders., , , and . CoRR, (2019)VISCR: Intuitive & Conflict-free Automation for Securing the Dynamic Consumer IoT Infrastructures., , , , and . CoRR, (2019)Robust Physical-World Attacks on Machine Learning Models., , , , , , , and . CoRR, (2017)FlowFence: Practical Data Protection for Emerging IoT Application Frameworks., , , , , and . USENIX Security Symposium, page 531-548. USENIX Association, (2016)Decentralized Action Integrity for Trigger-Action IoT Platforms., , , and . NDSS, The Internet Society, (2018)Tyche: A Risk-Based Permission Model for Smart Homes., , , and . SecDev, page 29-36. IEEE Computer Society, (2018)Towards Comprehensive Repositories of Opinions., , , and . HotNets, page 15-21. ACM, (2016)Probable cause: the deanonymizing effects of approximate DRAM., , , and . ISCA, page 604-615. ACM, (2015)Note on Attacking Object Detectors with Adversarial Stickers., , , , , , , , and . CoRR, (2017)