Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault Injection in Native Logic-in-Memory Computation on Neuromorphic Hardware., , , , , , and . DAC, page 1-6. IEEE, (2023)DeepAttack: A Deep Learning Based Oracle-less Attack on Logic Locking., , , , , and . ISCAS, page 1-5. IEEE, (2023)X-Fault: Impact of Faults on Binary Neural Networks in Memristor-Crossbar Arrays with Logic-in-Memory Computation., , , , , , , and . AICAS, page 174-177. IEEE, (2022)Evolving priority rules for resource constrained project scheduling problem with genetic programming., , , and . Future Gener. Comput. Syst., (2018)Work-in-Progress: A Universal Instrumentation Platform for Non-Volatile Memories., , , , , , , , , and . CODES+ISSS, page 44-45. IEEE, (2023)SoftFlow: Automated HW-SW Confidentiality Verification for Embedded Processors., , , , and . VLSI-SoC, page 1-6. IEEE, (2023)Vertical IP Protection of the Next-Generation Devices: Quo Vadis?, , , , , , , , , and . DATE, page 1905-1914. IEEE, (2021)Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware., , , , , , and . AFRICACRYPT, volume 9646 of Lecture Notes in Computer Science, page 147-166. Springer, (2016)S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go?, , , , , and . INDOCRYPT, volume 8885 of Lecture Notes in Computer Science, page 322-337. Springer, (2014)Scaling Logic Locking Schemes to Multi-module Hardware Designs., , , , and . ARCS, volume 12155 of Lecture Notes in Computer Science, page 138-152. Springer, (2020)