11 results on '"Xuanle Ren"'
Search Results
2. HEDA: Multi-Attribute Unbounded Aggregation over Homomorphically Encrypted Database.
3. Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level.
4. An Enclave-based TEE for SE-in-SoC in RISC-V Industry.
5. Detection of IJTAG attacks using LDPC-based feature reduction and machine learning.
6. IC Protection Against JTAG-Based Attacks.
7. Customizing Trusted AI Accelerators for Efficient Privacy-Preserving Machine Learning.
8. A Learning-Based Approach to Secure JTAG Against Unseen Scan-Based Attacks.
9. Detection of illegitimate access to JTAG via statistical learning in chip.
10. Improving accuracy of on-chip diagnosis via incremental learning.
11. IC protection against JTAG/IJTAG-based attacks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.