Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effect of Trojans on Write Data Access in Memory., , and . ISED, page 1-5. IEEE, (2019)Evaluation of Misspeculation Impact on Chip-Multiprocessors Power Overhead., , , , , and . ICSCA, page 129-133. ACM, (2018)Aspect based sentiment analysis using multi-criteria decision-making and deep learning under COVID-19 pandemic in India., , , and . CAAI Trans. Intell. Technol., 8 (1): 219-234 (March 2023)Hard to Detect Combinational Hardware Trojans., , and . ISED, page 194-198. IEEE, (2018)Stuck-At 0/1 Trojans on Return Address Stack., , and . ISED, page 210-214. IEEE, (2018)Word Embedding and String-Matching Techniques for Automobile Entity Name Identification from Web Reviews., , , and . EAI Endorsed Trans. Scalable Inf. Syst., 8 (33): e1 (2021)Change Management using Generative Modeling on Digital Twins., , , and . ISI, page 1-6. IEEE, (2023)Implicit Hardware Trojan: Principles and Enabling Methods., , and . ISOCC, page 55-56. IEEE, (2023)Identification of Periodic Boundary SACA Rules Exploring NSRT Diagram., , , and . ACRI, volume 13402 of Lecture Notes in Computer Science, page 29-39. Springer, (2022)A trojan framework in AES core to evade state-of-the-art HT detection schemes., , , , , , and . Microelectron. J., (2021)