32 results on '"Maniatakos, Mihalis"'
Search Results
2. On the Importance of Pooling Layer Tuning for Profiling Side-Channel Analysis
3. Robust co-synthesis of embedded control systems with occasional deadline misses
4. Quantum Computing Threat Modelling on a Generic CPS Setup
5. Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution Environment
6. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack
7. Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass
8. Towards Demystifying Adversarial Robustness of Binarized Neural Networks
9. POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools
10. POSTER: Another Look at Boyar-Peralta’s Algorithm
11. Kryptonite: An Adversarial Attack Using Regional Focus
12. POSTER: LHSA: Lightweight Hardware Security Arbitrator
13. PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor
14. Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures
15. An Efficient Proactive Secret Sharing Scheme for Cloud Storage
16. Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography
17. Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain
18. WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments Using Self-organizing Maps
19. A (Bit)slice of Rainbow
20. Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security
21. Attacklets to Test Anomaly Detectors for Critical Infrastructure
22. BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud?
23. Memory Deduplication as a Protective Factor in Virtualized Systems
24. Cyber-Attack Case Studies on Dynamic Voltage Restorer in Smart Grid
25. Towards Real-Time Deep Learning-Based Network Intrusion Detection on FPGA
26. On Reverse Engineering Neural Network Implementation on GPU
27. A Good Anvil Fears No Hammer: Automated Rowhammer Detection Using Unsupervised Deep Learning
28. Shaping Blockchain Technology for Securing Supply Chains
29. Proof of Assets in the Diem Blockchain
30. An Identity-Based Blind Signature Scheme with Message Recovery from Pairings
31. Towards Trained Model Confidentiality and Integrity Using Trusted Execution Environments
32. The Obfuscation Method of User Identification System
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.