RF data-driven device fingerprinting through the use of deep learning ha...
We present a safety verification framework for design-time and run-time
...
Cryptocurrency exchanges are frequently targeted and compromised by
cybe...
In this paper, we present a control framework that allows magnetic micro...