From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Closure of IC Layouts Against Hardware Trojans., , , , , , , , , и . ISPD, стр. 229-237. ACM, (2023)Toward Security Closure in the Face of Reliability Effects ICCAD Special Session Paper., , , , , , , , и . ICCAD, стр. 1-9. IEEE, (2021)AppGNN: Approximation-Aware Functional Reverse Engineering Using Graph Neural Networks., , , , , и . ICCAD, стр. 152:1-152:9. ACM, (2022)ScanSAT: unlocking obfuscated scan chains., , , , , и . ASP-DAC, стр. 352-357. ACM, (2019)Towards Provably Secure Logic Locking for Hardening Hardware Security Dissertation Summary: IEEE TTTC E.J. McCluskey Doctoral Thesis Award Competition., и . ITC, стр. 1-10. IEEE, (2018)Sneak-path Testing of Memristor-based Memories., , , и . VLSI Design, стр. 386-391. IEEE Computer Society, (2013)Fa-SAT: Fault-aided SAT-based Attack on Compound Logic Locking Techniques., , и . DATE, стр. 1166-1171. IEEE, (2021)Spin-Orbit Torque Devices for Hardware Security: From Deterministic to Probabilistic Regime., , , , и . CoRR, (2019)Adaptive reduction of the frequency search space for multi-vdd digital circuits., , , и . DATE, стр. 292-295. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Is split manufacturing secure?, , и . DATE, стр. 1259-1264. EDA Consortium San Jose, CA, USA / ACM DL, (2013)