Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cherry-picking: exploiting process variations in dark-silicon homogeneous chip multi-processors., , , and . DATE, page 39-44. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Reverse engineering camouflaged sequential circuits without scan access., , and . ICCAD, page 33-40. IEEE, (2017)Optimal de-anonymization in random graphs with community structure., , and . Sarnoff Symposium, page 1-2. IEEE, (2016)Fragility of the commons under prospect-theoretic risk attitudes., , and . Games Econ. Behav., (2016)Optimal checkpointing for secure intermittently-powered IoT devices., , and . ICCAD, page 376-383. IEEE, (2017)Adversarially Robust Learning via Entropic Regularization., , , , and . Frontiers Artif. Intell., (2021)Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way)., , , and . WOOT, USENIX Association, (2016)The Need for Declarative Properties in Digital IC Security., , , and . ACM Great Lakes Symposium on VLSI, page 333-338. ACM, (2017)Reliable computing with ultra-reduced instruction set co-processors., , , , and . DAC, page 697-702. ACM, (2012)FATE: fast and accurate timing error prediction framework for low power DNN accelerator design., and . ICCAD, page 24. ACM, (2018)