Author of the publication

Improving the Detection of Hardware Trojan Horses in Microprocessors via Hamming Codes.

, , , and . DFT, page 1-6. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implications of energy efficient Ethernet for hubs and switches., , and . Int. J. Commun. Networks Distributed Syst., 6 (1): 3-11 (2011)Characterizing a RISC-V SRAM-based FPGA implementation against Single Event Upsets using fault injection., , and . Microelectron. Reliab., (2017)Efficient implementation of error correction codes in hash tables., , , and . Microelectron. Reliab., 54 (1): 338-340 (2014)Extending 3-bit Burst Error-Correction Codes With Quadruple Adjacent Error Correction., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 26 (2): 221-229 (2018)A Comment on "Fast Bloom Filters and Their Generalization"., , and . IEEE Trans. Parallel Distributed Syst., 27 (1): 303-304 (2016)Exploiting Asymmetry in eDRAM Errors for Redundancy-Free Error-Tolerant Design., , , , and . IEEE Trans. Emerg. Top. Comput., 9 (4): 2064-2075 (2021)Integrating Delta Modulation and Stochastic Computing for Real-time Machine Learning based Heartbeats Monitoring in Wearable Systems., , , , , and . AICAS, page 1-5. IEEE, (2023)Reliability Evaluation of the Count Min Sketch (CMS) against Single Event Transients (SETs)., , , and . VTS, page 1-6. IEEE, (2021)An Experimental Analysis of SEU Sensitiveness on System Knowledge-based Hardening Techniques., , , , and . DDECS, page 261-266. IEEE Computer Society, (2007)Validation and optimization of TMR protections for circuits in radiation environments., , and . DDECS, page 399-400. IEEE Computer Society, (2011)