From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors., , , , и . DATE, стр. 1-6. IEEE, (2024)ExploreFault: Identifying Exploitable Fault Models in Block Ciphers with Reinforcement Learning., , , , , и . DAC, стр. 1-6. IEEE, (2023)Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges., , , и . ISOCC, стр. 217-218. IEEE, (2022)AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning., , , и . USENIX Security Symposium, USENIX Association, (2024)FlowBazaar: A Market-Mediated Software Defined Communications Ecosystem at the Wireless Edge., , , , , , , , , и . CoRR, (2018)MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors., , , , и . CoRR, (2023)DETERRENT: detecting trojans using reinforcement learning., , , , и . DAC, стр. 697-702. ACM, (2022)ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning., , , и . CCS, стр. 1275-1289. ACM, (2022)CreativEval: Evaluating Creativity of LLM-Based Hardware Code Generation., , и . CoRR, (2024)PSOFuzz: Fuzzing Processors with Particle Swarm Optimization., , , , и . ICCAD, стр. 1-9. IEEE, (2023)