Author of the publication

A novel hardware authentication primitive against modeling attacks.

, , , , , , , , , and . Int. J. Circuit Theory Appl., 51 (6): 2993-3001 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements Driven Knowledge System Design for Product Development., and . DET, volume 66 of Advances in Intelligent and Soft Computing, page 169-184. Springer, (2009)A Column Generation Approach Based on Region Growth., , , and . IEEE Access, (2019)Nanomechanics: emerging opportunities for future computing., , , and . Sci. China Inf. Sci., (2021)Self-Healing Event Logs., , and . IEEE Trans. Knowl. Data Eng., 33 (6): 2750-2763 (2021)CAGFuzz: Coverage-Guided Adversarial Generative Fuzzing Testing for Image-Based Deep Learning Systems., , , and . IEEE Trans. Software Eng., 48 (11): 4630-4646 (2022)A novel multi-agent reinforcement learning approach for job scheduling in Grid computing., , , and . Future Gener. Comput. Syst., 27 (5): 430-439 (2011)CAIR: Combining integrated attention with iterative optimization learning for sparse-view CT reconstruction., , , , , , , , and . Comput. Biol. Medicine, (September 2023)A classification and comparison of model checking software architecture techniques., , and . J. Syst. Softw., 83 (5): 723-744 (2010)A survey on smart contract vulnerabilities: Data sources, detection and repair., , , , , and . Inf. Softw. Technol., (July 2023)A Dual-Encoder-Single-Decoder Based Low-Dose CT Denoising Network., , , , , and . IEEE J. Biomed. Health Informatics, 26 (7): 3251-3260 (2022)