From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Closure of IC Layouts Against Hardware Trojans., , , , , , , , , и . ISPD, стр. 229-237. ACM, (2023)Embracing Graph Neural Networks for Hardware Security (Invited Paper)., , , и . CoRR, (2022)Hide and Seek: Seeking the (Un)-Hidden Key in Provably-Secure Logic Locking Techniques., , и . IEEE Trans. Inf. Forensics Secur., (2022)UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking., , , , , , и . IEEE Trans. Inf. Forensics Secur., (2021)Toward Security Closure in the Face of Reliability Effects ICCAD Special Session Paper., , , , , , , , и . ICCAD, стр. 1-9. IEEE, (2021)AppGNN: Approximation-Aware Functional Reverse Engineering Using Graph Neural Networks., , , , , и . ICCAD, стр. 152:1-152:9. ACM, (2022)Test power reductions through computationally efficient, decoupled scan chain modifications., и . IEEE Trans. Reliab., 54 (2): 215-223 (2005)Efficient RT-Level Fault Diagnosis., и . J. Comput. Sci. Technol., 20 (2): 166-174 (2005)Concerted Wire Lifting: Enabling Secure and Cost-Effective Split Manufacturing., , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (2): 266-280 (2022)Logic Locking With Provable Security Against Power Analysis Attacks., , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (4): 766-778 (2020)