Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NNoculation: Catching BadNets in the Wild., , , , , , , and . AISec@CCS, page 49-60. ACM, (2021)Towards decentralized system-level security for MPSoC-based embedded applications., , and . J. Syst. Archit., (2017)Qubit efficient quantum algorithms for the vehicle routing problem on quantum computers of the NISQ era., , , and . CoRR, (2023)NNoculation: Broad Spectrum and Targeted Treatment of Backdoored DNNs., , , , , , , and . CoRR, (2020)Invited: Independent Verification and Validation of Security-Aware EDA Tools and IP., , , , , , , , , and 3 other author(s). DAC, page 1299-1302. IEEE, (2021)ALMOST: Adversarial Learning to Mitigate Oracle-less ML Attacks via Synthesis Tuning., , , , , , , and . DAC, page 1-6. IEEE, (2023)Distinguishing AI- and Human-Generated Code: A Case Study., , and . SCORED@CCS, page 17-25. ACM, (2023)Special Session: Machine Learning for Semiconductor Test and Reliability., , , , , , , , , and . VTS, page 1-11. IEEE, (2021)AutoChip: Automating HDL Generation Using LLM Feedback., , , , , and . CoRR, (2023)Hardware-Supported Patching of Security Bugs in Hardware IP Blocks., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (1): 54-67 (2023)