Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Trojan Detection Using Machine Learning: A Tutorial., , , , , , , , , and . ACM Trans. Embed. Comput. Syst., 22 (3): 46:1-46:26 (2023)On the Performance of Malware Detection Classifiers Using Hardware Performance Counters., , , , , and . SmartNets, page 1-6. IEEE, (2024)Gotcha! I Know What You Are Doing on the FPGA Cloud: Fingerprinting Co-Located Cloud FPGA Accelerators via Measuring Communication Links., , , , , , , and . CCS, page 2024-2037. ACM, (2023)Silicon validation of LUT-based logic-locked IP cores., , , , , , , , and . DAC, page 1189-1194. ACM, (2022)Scalable MatMul-free Language Modeling, , , , , , , and . (2024)Security and Complexity Analysis of LUT-based Obfuscation: From Blueprint to Reality., , , , , , , , and . ICCAD, page 1-8. ACM, (2019)Static Design of Spin Transfer Torques Magnetic Look Up Tables for ASIC Designs., , , and . ACM Great Lakes Symposium on VLSI, page 507-510. ACM, (2018)Neuromorphic-Enabled Security for IoT., , , , , , , , and . NEWCAS, page 153-157. IEEE, (2022)Survey of Machine Learning for Electronic Design Automation., , , , , , , and . ACM Great Lakes Symposium on VLSI, page 513-518. ACM, (2022)Securing Hardware via Dynamic Obfuscation Utilizing Reconfigurable Interconnect and Logic Blocks., , , , , , and . DAC, page 229-234. IEEE, (2021)