David Hély
Grenoble INP
H-index: 19
Europe-France
Top articles of David Hély
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Modeling Thermal Effects For Biasing PUFs | Aghiles Douadi Ioana Vatajelu Paolo Maistri David Hély Vincent Beroulle | 2024/5/20 | |
Security and Reliability Evaluation of Countermeasures implemented using High-Level Synthesis | arXiv e-prints | Amalia Artemis Koufopoulou Kalliopi Xevgeni Athanasios Papadimitriou Mihalis Psarakis David Hely | 2023/12 |
On the Prediction of Hardware Security Properties of HLS Designs Using Graph Neural Networks | arXiv e-prints | Amalia Artemis Koufopoulou Athanasios Papadimitriou Aggelos Pikrakis Mihalis Psarakis David Hely | 2023/12 |
Sub-space modeling: an enrollment solution for xor arbiter puf using machine learning | Amir Ali-Pour David Hely Vincent Beroulle Giorgio Di Natale | 2022/4/6 | |
Secure enrollment for physical unclonable function devices | 2022/5/24 | ||
CyEnSe: Cyclic energy-aware scheduling for energy-harvested embedded systems | Microprocessors and Microsystems | Ehsan Aerabi Mahdi Fazeli David Hély | 2022/3/1 |
A memory hierarchy protected against side-channel attacks | Cryptography | Ezinam Bertrand Talaki Olivier Savry Mathieu Bouvier Des Noes David Hely | 2022/4/20 |
PUF-based data integrity | 2022/12/20 | ||
Strong puf enrollment with machine learning: A methodical approach | Electronics | Amir Ali-Pour David Hely Vincent Beroulle Giorgio Di Natale | 2022/2/19 |
An Offline Hardware Security Assessment Approach using Symbol Assertion and Code Shredding | Zahra Kazemi Amin Norollah Mahdi Fazeli David Hely Vincent Beroulle | 2022/4/6 | |
A Middleware for Secure Integration of Heterogeneous Edge Devices | Arthur Desuert Stéphanie Chollet Laurent Pion David Hély | 2022/7/10 | |
Refillable PUF authentication protocol for constrained devices | Journal of Ambient Intelligence and Smart Environments | Arthur Desuert Stéphanie Chollet Laurent Pion David Hély | 2022/1/1 |
Helper data masking for physically unclonable function-based key generation algorithms | IEEE Access | Amir Ali Pour Fatemeh Afghah David Hély Vincent Beroulle Giorgio Di Natale | 2022/4/6 |
Secure puf-based authentication and key exchange protocol using machine learning | Amir Ali-Pour Fatemeh Afghah David Hely Vincent Beroulle Giorgio Di Natale | 2022/7/4 | |
An efficient approach to model strong puf with multi-layer perceptron using transfer learning | Amir Ali-Pour David Hely Vincent Beroulle Giorgio Di Natale | 2022/4/6 | |
Elaborating on sub-space modeling as an enrollment solution for strong puf | Amir Ali-Pour David Hely Vincent Beroulle Giorgio Di Natale | 2022/5/30 | |
Hardware Support for Efficient and Low-Power Data Sorting in Massive Data Application: The 3-D Sorting Method | IEEE Consumer Electronics Magazine | Amin Norollah Zahra Kazemi Hakem Beitollahi David Hély | 2021/4/30 |
Efficient scheduling of dependent tasks in many-core real-time system using a hardware scheduler | Amin Norollah Zahra Kazemi Niloufar Sayadi Hakem Beitollahi Mahdi Fazeli | 2021/9/20 | |
CLASA: a Cross-Layer Agent Security Architecture for networked embedded systems | Romain Liévin Jean-Paul Jamont David Hély | 2021/8/23 | |
Design Space Exploration Applied to Security | Antoine Linarès David Hely Frank Lhermet Giorgio Di Natale | 2021/6/28 |