Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Human vs. Automatic Detection of Deepfake Videos Over Noisy Channels., , , and . ICME, page 1-6. IEEE, (2022)On resilience of security-oriented error detecting architectures against power attacks: a theoretical analysis., and . CF, page 229-237. ACM, (2021)Selective Hardening: Toward Cost-Effective Error Tolerance., and . IEEE Des. Test Comput., 28 (3): 54-63 (2011)Secure Composition for Hardware Systems (Dagstuhl Seminar 19301)., , , and . Dagstuhl Reports, 9 (7): 94-116 (2019)An Open-Source Area-Optimized ECEG Cryptosystem in Hardware., , and . ISVLSI, page 120-125. IEEE, (2020)Test and Reliability Challenges for Approximate Circuitry.. IEEE Embed. Syst. Lett., 10 (1): 26-29 (2018)Toward Error-Correcting Architectures for Cryptographic Circuits Based on Rabii-Keren Codes., , , and . IEEE Embed. Syst. Lett., 11 (4): 115-118 (2019)Failure mechanisms and test methods for the SRAM TVC write-assist technique., , , and . ETS, page 1-2. IEEE, (2016)Protecting artificial intelligence IPs: a survey of watermarking and fingerprinting for machine learning., , , , and . CAAI Trans. Intell. Technol., 6 (2): 180-191 (2021)Physics inspired compact modelling of BiFeO$_3$ based memristors for hardware security applications., , , , , , and . CoRR, (2022)