From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)., , и . CoRR, (2019)Survey on recent counterfeit IC detection techniques and future research directions., и . Integr., (2019)Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks., , и . IEEE Access, (2020)MacLeR: Machine Learning-Based Runtime Hardware Trojan Detection in Resource-Constrained IoT Edge Devices., , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (11): 3748-3761 (2020)Behavior profiling of power distribution networks for runtime hardware trojan detection., , , и . MWSCAS, стр. 1316-1319. IEEE, (2017)Area efficient soft error tolerant RISC pipeline: Leveraging data encoding and inherent ALU redundancy., и . MWSCAS, стр. 699-702. IEEE, (2017)Soft error aware pipelined architecture: Leveraging automatic repeat request protocol., и . MWSCAS, стр. 549-552. IEEE, (2013)Edge Intelligence in Mobile Nodes: Opportunistic Pipeline via 5G D2D for On-site Sensing., , и . VTC Fall, стр. 1-5. IEEE, (2022)Hardening Hardware Accelerartor Based CNN Inference Phase Against Adversarial Noises., , и . HOST, стр. 141-144. IEEE, (2022)Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors., , , и . AsianHOST, стр. 1-6. IEEE Computer Society, (2016)