Author of the publication

Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks.

, , , , , , and . ACM Trans. Design Autom. Electr. Syst., 25 (1): 4:1-4:32 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using the Augmented Reality Technique to Develop Visualization Mindtools for Chemical Inquiry-Based Activities., , and . IIAI-AAI, page 354-357. IEEE Computer Society, (2015)Spatio-Temporal Analysis of D2D Networks in Finite Areas., , , , , and . IEEE Trans. Veh. Technol., 72 (6): 8239-8243 (June 2023)D-S Evidence Theory Based Trust Detection Scheme in Wireless Sensor Networks., , , and . Int. J. Technol. Hum. Interact., 12 (2): 48-59 (2016)Blind Demixing for Low-Latency Communication., , and . IEEE Trans. Wirel. Commun., 18 (2): 897-911 (2019)PIRD: Pan Immune Repertoire Database., , , , , , , , , and 14 other author(s). Bioinform., 36 (3): 897-903 (2020)Robust Group Anomaly Detection for Quasi-Periodic Network Time Series., , , , and . IEEE Trans. Netw. Sci. Eng., 9 (4): 2833-2845 (2022)Safety-Critical Task Offloading Heuristics for Workflow Applications in Mobile Edge Computing., , , , , and . J. Circuits Syst. Comput., 32 (11): 2350186:1-2350186:21 (July 2023)Energy-Aware Application Placement in Mobile Edge Computing: A Stochastic Optimization Approach., , , and . IEEE Trans. Parallel Distributed Syst., 31 (4): 909-922 (2020)Tire X-ray Detection Method Based on BP Neural Network., , and . ICIGP, page 64-67. ACM, (2018)Study on the Rowing of Flexible Actuating Leg on Water Surface Intimating Water Striders., , , and . ICIA, page 196-202. IEEE, (2018)