16 results on '"Alasad, Qutaiba"'
Search Results
2. Impacting Robustness in Deep Learning-Based NIDS through Poisoning Attacks
3. Towards Adversarial Attacks for Clinical Document Classification
4. Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML
5. Multi-Tier 3D IC Physical Design with Analytical Quadratic Partitioning Algorithm Using 2D P&
6. Resilient and Secure Hardware Devices Using ASL
7. Strong Logic Obfuscation with Low Overhead against IC Reverse Engineering Attacks
8. Resilient AES Against Side-Channel Attack Using All-Spin Logic
9. Logic Obfuscation against IC Reverse Engineering Attacks Using PLGs
10. Logic Locking Using Hybrid CMOS and Emerging SiNW FETs
11. Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things
12. Leveraging All-Spin Logic to Improve Hardware Security
13. E2LEMI:Energy-Efficient Logic Encryption Using Multiplexer Insertion
14. Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things.
15. E2LEMI:Energy-Efficient Logic Encryption Using Multiplexer Insertion.
16. Provably Trustworthy and Secure Hardware Design with Low Overhead
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.