Author of the publication

Guest Editor's Introduction: Special Section on Reliability-Aware Design and Analysis Methods for Digital Systems: From Gate to System Level.

, , and . IEEE Trans. Emerg. Top. Comput., 8 (3): 561-563 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting state obfuscation to detect hardware trojans in NoC network interfaces., and . MWSCAS, page 1-4. IEEE, (2015)A hardened network-on-chip design using runtime hardware Trojan mitigation methods., and . Integr., (2017)An Orthogonal Algorithm for Key Management in Hardware Obfuscation., , , , , , and . AsianHOST, page 1-4. IEEE, (2019)Securing FPGA-based obsolete component replacement for legacy systems., , , , and . ISQED, page 401-406. IEEE, (2018)Mitigating Control Flow Attacks in Embedded Systems with Novel Built-in Secure Register Bank., , , and . ACM Great Lakes Symposium on VLSI, page 483-486. ACM, (2017)Optimal pressure sensor locations in smart insoles for heel-strike and toe-off detection., , , , , and . BioCAS, page 458-461. IEEE, (2022)Transient error management for partially adaptive router in network-on-chip (NoC)., and . ISCAS, page 1672-1675. IEEE, (2012)Session details: Session 6A: Special Session -1: Machine Learning and Hardware Attacks.. ACM Great Lakes Symposium on VLSI, ACM, (2022)DPReDO: Dynamic Partial Reconfiguration enabled Design Obfuscation for FPGA Security., , and . SOCC, page 1-6. IEEE, (2022)Invariance Checking Based Trojan Detection Method for Three-Dimensional Integrated Circuits., and . ISCAS, page 1-5. IEEE, (2020)