Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring the structure and function of temporal networks with dynamic graphlets., , and . Bioinform., 32 (15): 2402 (2016)Teaching and learning with children: Impact of reciprocal peer learning with a social robot on children's learning and emotive engagement., , and . Comput. Educ., (2020)Optimal Design of S Band with Graphene Frequency Multiplier., , , , , and . CSPS (3), volume 517 of Lecture Notes in Electrical Engineering, page 606-611. Springer, (2018)AdaTest: Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection., , , and . ACM Trans. Embed. Comput. Syst., 22 (2): 37:1-37:23 (March 2023)PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications., , and . CoRR, (2022)Trustworthy AI Inference Systems: An Industry Research View., , , , , , , , , and 18 other author(s). CoRR, (2020)Toward Designing Social Human-Robot Interactions for Deep Space Exploration., and . CoRR, (2021)Comparative Analysis of Deep Learning Models for Brand Logo Classification in Real-World Scenarios., , and . CoRR, (2023)TAD: Trigger Approximation based Black-box Trojan Detection for AI., , and . CoRR, (2021)FlowTrojan: Insertion and Detection of Hardware Trojans on Flow-Based Microfluidic Biochips., , and . NEWCAS, page 158-161. IEEE, (2020)