From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files., , , , , , , , и . IEEE Embed. Syst. Lett., 14 (3): 111-114 (2022)An Empirical Cybersecurity Evaluation of GitHub Copilot's Code Contributions., , , , и . CoRR, (2021)LLM-assisted Generation of Hardware Assertions., , , , , , и . CoRR, (2023)Runtime Interchange for Adaptive Re-use of Intelligent Cyber-Physical System Controllers., , , и . CoRR, (2021)High-Level Approaches to Hardware Security: A Tutorial., , и . CoRR, (2022)Explaining EDA synthesis errors with LLMs., , и . CoRR, (2024)Can Large Language Models Identify And Reason About Security Vulnerabilities? Not Yet., , , , , и . CoRR, (2023)Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design., , , , , , , , , и 2 other автор(ы). ICCAD, стр. 157:1-157:9. ACM, (2022)Chip-Chat: Challenges and Opportunities in Conversational Hardware Design., , , и . MLCAD, стр. 1-6. IEEE, (2023)(Security) Assertions by Large Language Models., , , , , , и . IEEE Trans. Inf. Forensics Secur., (2024)