Search Constraints
Search Results
Select an image to start the slideshow
Cross-Layer Vulnerability Analysis of System-on-Chip against Physical Hardware Attacks
1 of 10
Visual Cross-Modal Mapping, Labeling and Localization
2 of 10
Software-Induced Fault Attacks on Post-Quantum Signature Schemes
3 of 10
Side-channel Testing Infrastructures in Preand Post-Silicon Settings
4 of 10
Secure Control for Autonomous Cyber-Physical Systems Under Temporal Logic Constraints
5 of 10
Design and Evaluation of Bit-sliced Neural Network and Post-Quantum Implementations
6 of 10
Opportunistic RF Localization of Tire Pressure Monitoring System Transmissions
7 of 10
NDTNet: An End-to-End Design of an Optical Nondestructive Evaluation System for Metallic Objects on FPGA
8 of 10
Analog/Mixed-Signal Techniques for Luminescent Lifetime Estimation with Applications in Transcutaneous Oxygen Measurements
9 of 10
Enhancing Vehicular Networking Using Bumblebee Foraging Theory and Signals of Opportunity
10 of 10