Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning the optimal operating point for many-core systems with extended range voltage/frequency scaling., , , and . CODES+ISSS, page 8:1-8:10. IEEE, (2013)Resource sharing games with failures and heterogeneous risk attitudes., , and . Allerton, page 535-542. IEEE, (2013)A Hybrid Amplitude/Time Encoding Scheme for Enhancing Coding Efficiency and Dynamic Range in Digitally Modulated Power Amplifiers., , and . IEEE J. Emerg. Sel. Topics Circuits Syst., 3 (4): 498-507 (2013)BadNets: Evaluating Backdooring Attacks on Deep Neural Networks., , , and . IEEE Access, (2019)Inspiring trust in outsourced integrated circuit fabrication.. DATE, page 1128. IEEE, (2017)Tagged probabilistic simulation based error probability estimation for better-than-worst case circuit design., , and . VLSI-SoC, page 368-373. IEEE, (2013)Custom feedback control: enabling truly scalable on-chip power management for MPSoCs., , and . ISLPED, page 425-430. ACM, (2010)A Concentration of Measure Approach to Correlated Graph Matching., , and . IEEE J. Sel. Areas Inf. Theory, 2 (1): 338-351 (2021)Robust Deep Learning for IC Test Problems., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (1): 183-195 (2022)Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks., , , , , and . CoRR, (2020)