Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XMAP: Programming Memristor Crossbars for Analog Matrix-Vector Multiplication: Toward High Precision Using Representable Matrices., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (6): 1827-1841 (2022)On the Robustness of AlphaFold: A COVID-19 Case Study., , , , , , , and . CoRR, (2023)Attribution-driven Causal Analysis for Detection of Adversarial Examples., , , , , , , and . CoRR, (2019)Computation of Boolean matrix chain products in 3D ReRAM., and . ISCAS, page 1-4. IEEE, (2017)Calibration of stochastic biochemical models against behavioral temporal logic specifications., and . ICCABS, page 1. IEEE Computer Society, (2017)Model Checking For Fault Explanation., , and . CDC, page 404-409. IEEE, (2006)Automated Synthesis for In-Memory Computing., , , and . ICCAD, page 1-9. IEEE, (2023)Adversarial attacks on computer vision algorithms using natural perturbations., , , , , , and . IC3, page 1-6. IEEE Computer Society, (2017)SATYA : Defending Against Adversarial Attacks Using Statistical Hypothesis Testing., , , and . FPS, volume 10723 of Lecture Notes in Computer Science, page 277-292. Springer, (2017)Filter based Explorized Policy Iteration Algorithm for On-Policy Approximate LQR., , and . SSCI, page 133-140. IEEE, (2019)