From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects., , , и . IEEE Trans. Emerg. Top. Comput., 9 (4): 1815-1834 (2021)Security Promises and Vulnerabilities in Emerging Reconfigurable Nanotechnology-Based Circuits., , , , , и . IEEE Trans. Emerg. Top. Comput., 10 (2): 763-778 (2022)$PoisonedGNN$: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems., , , , и . IEEE Trans. Computers, 72 (10): 2822-2834 (октября 2023)Securing Cloud FPGAs Against Power Side-Channel Attacks: A Case Study on Iterative AES., , , , и . CoRR, (2023)Power Side-Channel Attacks in Negative Capacitance Transistor (NCFET)., , , , , , , и . CoRR, (2020)GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking., , , , , , и . CoRR, (2020)Games, Dollars, Splits: A Game-Theoretic Analysis of Split Manufacturing., , , , и . IEEE Trans. Inf. Forensics Secur., (2021)ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning., , , и . CCS, стр. 1275-1289. ACM, (2022)Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning., , , , , и . IACR Cryptol. ePrint Arch., (2022)Spin-Based Reconfigurable Logic for Power- and Area-Efficient Applications., , , , и . IEEE Des. Test, 36 (3): 22-30 (2019)