From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling and verification of industrial flash memories., , , и . ISQED, стр. 705-712. IEEE, (2010)Mechanized Information Flow Analysis through Inductive Assertions., , , и . FMCAD, стр. 1-4. IEEE, (2008)Using ACL2 to Verify Loop Pipelining in Behavioral Synthesis., , , и . ACL2, том 152 из EPTCS, стр. 111-128. (2014)Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice., , , , , , и . J. Hardw. Syst. Secur., 2 (2): 97-110 (2018)Security of Multi-Agent Cyber-Physical Systems: A Survey., и . IEEE Access, (2022)Guarding Deep Learning Systems With Boosted Evasion Attack Detection and Model Update., , , и . IEEE Internet Things J., 11 (6): 9382-9391 (марта 2024)SoCCom: Automated Synthesis of System-on-Chip Architectures., , , и . IEEE Trans. Very Large Scale Integr. Syst., 30 (4): 449-462 (2022)SeVNoC: Security Validation of System-on-Chip Designs With NoC Fabrics., , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (2): 672-682 (февраля 2023)Resilient Cooperative Adaptive Cruise Control for Autonomous Vehicles Using Machine Learning., , и . CoRR, (2021)Combining Theorem Proving with Model Checking through Predicate Abstraction., и . IEEE Des. Test Comput., 24 (2): 132-139 (2007)