Author of the publication

Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges.

, , , and . ISOCC, page 217-218. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SFLL-HLS: Stripped-Functionality Logic Locking Meets High-Level Synthesis., , and . ICCAD, page 1-4. ACM, (2019)Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach., , and . IEEE Trans. Very Large Scale Integr. Syst., 24 (9): 2946-2959 (2016)DETERRENT: detecting trojans using reinforcement learning., , , , and . DAC, page 697-702. ACM, (2022)Towards provably-secure performance locking., , , , , and . DATE, page 1592-1597. IEEE, (2018)Does logic locking work with EDA tools?, , and . USENIX Security Symposium, page 1055-1072. USENIX Association, (2021)Schmitt Trigger-Based Key Provisioning for Locking Analog/RF Integrated Circuits., , , , , and . ITC, page 1-10. IEEE, (2020)SARLock: SAT attack resistant logic locking., , , and . HOST, page 236-241. IEEE Computer Society, (2016)An overview of hardware intellectual property protection.. ISCAS, page 1-4. IEEE, (2017)On designing optimal camouflaged layouts., , and . HOST, page 169. IEEE Computer Society, (2017)Routing perturbation for enhanced security in split manufacturing., , , and . ASP-DAC, page 605-510. IEEE, (2017)