From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Energy-Efficient Memristive Threshold Logic Circuit., , , и . IEEE Trans. Computers, 61 (4): 474-487 (2012)Securing pressure measurements using SensorPUFs., , и . ISCAS, стр. 1330-1333. IEEE, (2016)Towards a comprehensive and systematic classification of hardware Trojans., , , , и . ISCAS, стр. 1871-1874. IEEE, (2010)Molecular Barcoding as a Defense Against Benchtop Biochemical Attacks on DNA Fingerprinting and Information Forensics., , , , и . IEEE Trans. Inf. Forensics Secur., (2020)Hardware and embedded security in the context of internet of things., , и . CyCAR@CCS, стр. 61-64. ACM, (2013)Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks., , , , , и . CoRR, (2020)Robust Deep Learning for IC Test Problems., , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (1): 183-195 (2022)On Improving the Security of Logic Locking., , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 35 (9): 1411-1424 (2016)Architecture Support for Dynamic Integrity Checking., , и . IEEE Trans. Inf. Forensics Secur., 7 (1): 321-332 (2012)A Theoretical Study of Hardware Performance Counters-Based Malware Detection., , , и . IEEE Trans. Inf. Forensics Secur., (2020)