From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hardware Trojan Detection Using Machine Learning: A Tutorial., , , , , , , , , и . ACM Trans. Embed. Comput. Syst., 22 (3): 46:1-46:26 (2023)On the Performance of Malware Detection Classifiers Using Hardware Performance Counters., , , , , и . SmartNets, стр. 1-6. IEEE, (2024)Silicon validation of LUT-based logic-locked IP cores., , , , , , , , и . DAC, стр. 1189-1194. ACM, (2022)Gotcha! I Know What You Are Doing on the FPGA Cloud: Fingerprinting Co-Located Cloud FPGA Accelerators via Measuring Communication Links., , , , , , , и . CCS, стр. 2024-2037. ACM, (2023)Scalable MatMul-free Language Modeling., , , , , , , и . CoRR, (2024)Security and Complexity Analysis of LUT-based Obfuscation: From Blueprint to Reality., , , , , , , , и . ICCAD, стр. 1-8. ACM, (2019)Static Design of Spin Transfer Torques Magnetic Look Up Tables for ASIC Designs., , , и . ACM Great Lakes Symposium on VLSI, стр. 507-510. ACM, (2018)Neuromorphic-Enabled Security for IoT., , , , , , , , и . NEWCAS, стр. 153-157. IEEE, (2022)Survey of Machine Learning for Electronic Design Automation., , , , , , , и . ACM Great Lakes Symposium on VLSI, стр. 513-518. ACM, (2022)Securing Hardware via Dynamic Obfuscation Utilizing Reconfigurable Interconnect and Logic Blocks., , , , , , и . DAC, стр. 229-234. IEEE, (2021)