Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security for safety: a path toward building trusted autonomous vehicles., , , , and . ICCAD, page 92. ACM, (2018)Protecting Platoons from Stealthy Jamming Attack., , , and . AsianHOST, page 1-6. IEEE, (2020)Pre-silicon security verification and validation: a formal perspective., , , , and . DAC, page 145:1-145:6. ACM, (2015)Estimation of Safe Sensor Measurements of Autonomous System Under Attack., , , , , , and . DAC, page 46:1-46:6. ACM, (2017)LLM4SecHW: Leveraging Domain-Specific Large Language Model for Hardware Debugging., , , , and . AsianHOST, page 1-6. IEEE, (2023)Hierarchy-Preserving Formal Verification Methods for Pre-silicon Security Assurance., , and . MTV, page 48-53. IEEE Computer Society, (2015)Scalable SoC trust verification using integrated theorem proving and model checking., , , and . HOST, page 124-129. IEEE Computer Society, (2016)Automatic RTL-to-Formal Code Converter for IP Security Formal Verification., , , and . MTV, page 35-38. IEEE Computer Society, (2016)Resilient Distributed Filter for State Estimation of Cyber-Physical Systems Under Attack., , and . ACC, page 5141-5147. IEEE, (2019)Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge., , , , , , , , and . ASPDAC, page 349-354. IEEE, (2024)