Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensemble learning for effective run-time hardware-based malware detection: a comprehensive analysis and classification., , , , , and . DAC, page 1:1-1:6. ACM, (2018)SAT-Hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain., , , and . IEEE Trans. Very Large Scale Integr. Syst., 28 (4): 954-967 (2020)DFSSD: Deep Faults and Shallow State Duality, A Provably Strong Obfuscation Solution for Circuits with Restricted Access to Scan Chain., , , , , , and . VTS, page 1-6. IEEE, (2020)Hardware Trojan Detection Using Machine Learning: A Tutorial., , , , , , , , , and . ACM Trans. Embed. Comput. Syst., 22 (3): 46:1-46:26 (2023)NNgSAT: Neural Network guided SAT Attack on Logic Locked Complex Structures., , , and . ICCAD, page 79:1-79:9. IEEE, (2020)SRCLock: SAT-Resistant Cyclic Logic Locking for Protecting the Hardware., , and . ACM Great Lakes Symposium on VLSI, page 153-158. ACM, (2018)On Designing Secure and Robust Scan Chain for Protecting Obfuscated Logic., , , and . ACM Great Lakes Symposium on VLSI, page 217-222. ACM, (2020)Energy-Efficient Hardware for Language Guided Reinforcement Learning., , , , , , , and . ACM Great Lakes Symposium on VLSI, page 131-136. ACM, (2020)Machine Learning-Assisted Website Fingerprinting Attacks with Side-Channel Information: A Comprehensive Analysis and Characterization., , , , , and . ISQED, page 79-84. IEEE, (2021)Conditional Classification: A Solution for Computational Energy Reduction., , , , and . ISQED, page 325-330. IEEE, (2021)