Author:
Makrani Hosein Mohammadi,Sayadi Hossein,Nazari Najmeh,Khasawneh Khaled N.,Sasan Avesta,Rafatirad Setareh,Homayoun Houman
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evaluating and Optimizing Cryptographic Offloading for IoT Devices: Attribute-Based Encryption Case Study;2024 IEEE International Conference on Communications Workshops (ICC Workshops);2024-06-09
2. Everywhere All at Once: Co-Location Attacks on Public Cloud FaaS;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1;2024-04-17
3. LLM-FIN: Large Language Models Fingerprinting Attack on Edge Devices;2024 25th International Symposium on Quality Electronic Design (ISQED);2024-04-03
4. Cyber-Immunity at the Core: Securing Biomedical Devices through Hardware-Level Machine Learning Defense;2023 IEEE Biomedical Circuits and Systems Conference (BioCAS);2023-10-19
5. Adversarial Attacks Against Machine Learning-Based Resource Provisioning Systems;IEEE Micro;2023-09