Author of the publication

Stochastic-HMDs: Adversarial-Resilient Hardware Malware Detectors via Undervolting.

, , and . DAC, page 1-6. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Hardware Malware Detectors That are Resilient to Adversarial Evasion., , , , and . IEEE Trans. Computers, 71 (11): 2872-2887 (2022)Adversarial Attacks Against Machine Learning-Based Resource Provisioning Systems., , , , , , , and . IEEE Micro, 43 (5): 35-44 (September 2023)Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud., , , , , , and . SEED, page 1-13. IEEE, (2021)Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks., , , , , , , and . NDSS, The Internet Society, (2022)Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks., , and . ICCAD, page 1-9. IEEE, (2021)Evolution of Defenses against Transient-Execution Attacks., , , and . ACM Great Lakes Symposium on VLSI, page 169-174. ACM, (2020)Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling., , and . CoRR, (2021)Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks., , , , , , and . CoRR, (2022)SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation., , , , and . CoRR, (2019)Evasive Hardware Trojan through Adversarial Power Trace., , and . CoRR, (2024)