Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Process Variability in Voltage/Frequency Control., , and . IEEE Trans. Very Large Scale Integr. Syst., 20 (8): 1392-1404 (2012)On Evaluating Neural Network Backdoor Defenses., and . CoRR, (2020)Adversarially Robust Learning via Entropic Regularization., , , and . CoRR, (2020)HaDeS: architectural synthesis for <u>h</u>eterogeneous <u>d</u>ark <u>s</u>ilicon chip multi-processors., , , and . DAC, page 173:1-173:7. ACM, (2013)Outsourcing Private Machine Learning via Lightweight Secure Arithmetic Computation., , , , , and . CoRR, (2018)Thundervolt: enabling aggressive voltage underscaling and timing error resilience for energy efficient deep learning accelerators., , , and . DAC, page 19:1-19:6. ACM, (2018)A Feature-Based On-Line Detector to Remove Adversarial-Backdoors by Iterative Demarcation., , , , and . IEEE Access, (2022)Bulls-Eye: Active Few-Shot Learning Guided Logic Synthesis., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (8): 2580-2590 (2023)Training Data Poisoning in ML-CAD: Backdooring DL-Based Lithographic Hotspot Detectors., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (6): 1244-1257 (2021)Vertically-addressed test structures (VATS) for 3D IC variability and stress measurements., , and . ISQED, page 96-103. IEEE, (2013)