​
Login / Signup
Naila Mukhtar
ORCID
Publication Activity (10 Years)
Years Active: 2015-2023
Publications (10 Years): 8
Top Topics
Elliptic Curve
Secret Key
Feature Engineering
Convolutional Neural Network
Top Venues
IACR Cryptol. ePrint Arch.
ACM Trans. Internet Techn.
SIN
Concurr. Comput. Pract. Exp.
</>
Publications
</>
Naila Mukhtar
,
Mohamad Ali Mehrabi
,
Yinan Kong
,
Ashiq Anjum
Edge enhanced deep learning system for IoT edge device security analytics.
Concurr. Comput. Pract. Exp.
35 (13) (2023)
Naila Mukhtar
,
Lejla Batina
,
Stjepan Picek
,
Yinan Kong
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices.
CT-RSA
(2022)
Naila Mukhtar
,
Louiza Papachristodoulou
,
Apostolos P. Fournaris
,
Lejla Batina
,
Yinan Kong
Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering.
COSADE
(2022)
Naila Mukhtar
,
Lejla Batina
,
Stjepan Picek
,
Yinan Kong
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices.
IACR Cryptol. ePrint Arch.
2021 (2021)
Mohamad Ali Mehrabi
,
Naila Mukhtar
,
Alireza Jolfaei
Power Side-Channel Analysis of RNS GLV ECC Using Machine and Deep Learning Algorithms.
ACM Trans. Internet Techn.
21 (3) (2021)
Naila Mukhtar
,
Louiza Papachristodoulou
,
Apostolos P. Fournaris
,
Lejla Batina
,
Yinan Kong
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering.
IACR Cryptol. ePrint Arch.
2020 (2020)
Naila Mukhtar
,
Apostolos P. Fournaris
,
Tariq Mahmood Khan
,
Charis Dimopoulos
,
Yinan Kong
Improved Hybrid Approach for Side-Channel Analysis Using Efficient Convolutional Neural Network and Dimensionality Reduction.
IEEE Access
8 (2020)
Naila Mukhtar
,
Yinan Kong
Secret Key Classification Based on Electromagnetic Analysis and Feature Extraction Using Machine-Learning Approach.
FNSS
(2018)
Naila Mukhtar
,
M. S. Baig
,
L. A. Khan
Improved trust based key management for end-to-end secure communication in cellular networks.
SIN
(2015)