Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Markov Chain Based Efficient Defense Against Adversarial Examples in Computer Vision., , , , and . IEEE Access, (2019)Boosting the sensing granularity of acoustic signals by exploiting hardware non-linearity., , , and . HotNets, page 53-59. ACM, (2022)Are Factuality Checkers Reliable? Adversarial Meta-evaluation of Factuality in Summarization., , and . EMNLP (Findings), page 2082-2095. Association for Computational Linguistics, (2021)Learning Structured Sparsity in Deep Neural Networks., , , , and . NIPS, page 2074-2082. (2016)The Applications of NVM Technology in Hardware Security., , , , , , and . ACM Great Lakes Symposium on VLSI, page 311-316. ACM, (2016)Geometry variations analysis of TiO2 thin-film and spintronic memristors., , , , and . ASP-DAC, page 25-30. IEEE, (2011)Emerging sensing techniques for emerging memories., and . ASP-DAC, page 204-210. IEEE, (2011)Probabilistic design in spintronic memory and logic circuit., , and . ASP-DAC, page 323-328. IEEE, (2012)Mobile user classification and authorization based on gesture usage recognition., , , , and . ASP-DAC, page 384-389. IEEE, (2013)Training itself: Mixed-signal training acceleration for memristor-based neural network., , , , and . ASP-DAC, page 361-366. IEEE, (2014)