Search Constraints
Search Results
Select an image to start the slideshow
Revisiting Isolated and Trusted Execution via Microarchitectural Cryptanalysis
1 of 8
Bluetooth Packet Capture and Analysis Using Wireless Product Testbed
2 of 8
Non-Submodular Combinatorial Optimization in Control Systems: Efficient Algorithms with Provable Bounds
3 of 8
Machine Learning for Reliable Communication and Improved Tracking of Dynamical Systems
4 of 8
Control Barrier Functions for Safe CPS Under Sensor Faults and Attacks
5 of 8
Towards Automated Analysis of Microarchitectural Attacks using Machine Learning
6 of 8
Improving the Performance of Dynamic Electromyogram-to-Force Models for the Hand-Wrist and Multiple Fingers
7 of 8
Age of Information in Multi-Hop Status Update Systems: Fundamental Bounds and Scheduling Policy Design
8 of 8