Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling approaches for Silent Attrition prediction in Payment networks., , , , , , and . ICMLA, page 409-414. IEEE, (2021)Temporal Debiasing using Adversarial Loss based GNN architecture for Crypto Fraud Detection., , , , and . ICMLA, page 391-396. IEEE, (2021)A Wireless Intrusion Detection System for 802.11 WPA3 Networks., , , , , and . COMSNETS, page 384-392. IEEE, (2022)Combining Decision Diagrams and SAT Procedures for Efficient Symbolic Model Checking., , , and . CAV, volume 1855 of Lecture Notes in Computer Science, page 124-138. Springer, (2000)A slew rate enhancement technique for operational amplifiers based on a tunable active Gm-based capacitance multiplication circuit., , and . ACM Great Lakes Symposium on VLSI, page 273-276. ACM, (2003)An On-Chip Coupling Capacitance Measurement Technique., , and . VLSI Design, page 495-499. IEEE Computer Society, (2001)Reconsidering CEGAR: Learning Good Abstractions without Refinement., and . ICCD, page 591-598. IEEE Computer Society, (2005)SAT-Based Image Computation with Application in Reachability Analysis., , , and . FMCAD, volume 1954 of Lecture Notes in Computer Science, page 354-371. Springer, (2000)Model Checking: Back and Forth between Hardware and Software., , , and . VSTTE, volume 4171 of Lecture Notes in Computer Science, page 251-255. Springer, (2005)First steps towards SAT-based formal analog verification., , , , and . ICCAD, page 1-8. ACM, (2009)