From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hardware-based attacks to compromise the cryptographic security of an election system., , , , и . ICCD, стр. 153-156. IEEE Computer Society, (2016)Machine Learning-Based Hotspot Detection: Fallacies, Pitfalls and Marching Orders., , и . ICCAD, стр. 1-8. ACM, (2019)CASPER: CAD Framework for a Novel Transistor-Level Programmable Fabric., , , , , , и . ISCAS, стр. 1-5. IEEE, (2020)VIPER: A Versatile and Intuitive Pattern GenERator for Early Design Space Exploration., , и . ITC, стр. 1-7. IEEE, (2019)ATTEST: Application-Agnostic Testing of a Novel Transistor-Level Programmable Fabric., , , , , , и . VTS, стр. 1-6. IEEE, (2020)Functional Obfuscation of Hardware Accelerators through Selective Partial Design Extraction onto an Embedded FPGA., , , , , , , и . ACM Great Lakes Symposium on VLSI, стр. 171-176. ACM, (2019)Design Space Exploration for Hotspot Detection., и . MTV, стр. 73-77. IEEE, (2019)Enhanced hotspot detection through synthetic pattern generation and design of experiments., , и . VTS, стр. 1-6. IEEE Computer Society, (2018)PatternPaint: Generating Layout Patterns Using Generative AI and Inpainting Techniques., , , , , и . CoRR, (2024)Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks., , , , , и . CoRR, (2020)