From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing Security Vulnerabilities Induced by High-level Synthesis., , , , и . ACM J. Emerg. Technol. Comput. Syst., 18 (3): 47:1-47:22 (2022)AIME: Watermarking AI Models by Leveraging Errors., , , и . DATE, стр. 304-309. IEEE, (2022)SHarPen: SoC Security Verification by Hardware Penetration Test., , , , , , и . ASP-DAC, стр. 579-584. ACM, (2023)RTL-FSMx: Fast and Accurate Finite State Machine Extraction at the RTL for Security Applications., , , и . ITC, стр. 165-174. IEEE, (2022)POCA: First Power-on Chip Authentication in Untrusted Foundry and Assembly., , , , , , и . HOST, стр. 124-135. IEEE, (2021)Invited: End-to-End Secure SoC Lifecycle Management., , , , , и . DAC, стр. 1295-1298. IEEE, (2021)A new structure for interconnect offline testing., , , , и . EWDTS, стр. 1-5. IEEE Computer Society, (2013)Trojan localization using symbolic algebra., , и . ASP-DAC, стр. 591-597. IEEE, (2017)FTC: A Universal Framework for Fault-Injection Attack Detection and Prevention., , , , и . IEEE Trans. Very Large Scale Integr. Syst., 32 (7): 1311-1324 (июля 2024)Cost-effective analysis of post-silicon functional coverage events., , , , и . DATE, стр. 392-397. IEEE, (2017)