From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners., , и . CoRR, (2021)Chaogate Parameter Optimization using Bayesian Optimization and Genetic Algorithm., , , , , и . ISQED, стр. 426-431. IEEE, (2021)Low-Cost Remarked Counterfeit IC Detection using LDO Regulators., , и . ISCAS, стр. 1-5. IEEE, (2020)HWGN2: Side-Channel Protected NNs Through Secure and Private Function Evaluation., , , и . SPACE, том 13783 из Lecture Notes in Computer Science, стр. 225-248. Springer, (2022)A Fourier Analysis Based Attack Against Physically Unclonable Functions., , и . Financial Cryptography, том 10957 из Lecture Notes in Computer Science, стр. 310-328. Springer, (2018)Recycled SoC Detection Using LDO Degradation., , и . SN Comput. Sci., 1 (6): 312 (2020)ScatterVerif: Verification of Electronic Boards Using Reflection Response of Power Distribution Network., , , и . ACM J. Emerg. Technol. Comput. Syst., 18 (4): 65:1-65:24 (2022)1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits., , , , и . IACR Cryptol. ePrint Arch., (2024)RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions., , , , и . FDTC, стр. 48-55. IEEE, (2019)Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives., , , , , , , , , и . CoRR, (2020)