Author of the publication

Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks.

, , , , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Dithering: A Run-Time Method for Trojan Neutralization in Wireless Cryptographic ICs., , , and . ITC, page 1-7. IEEE, (2018)A field programmable transistor array featuring single-cycle partial/full dynamic reconfiguration., , , , , and . DATE, page 1336-1341. IEEE, (2017)Hardware-assisted rootkit detection via on-line statistical fingerprinting of process execution., and . DATE, page 1580-1585. IEEE, (2018)Range-Controlled Floating-Gate Transistors: A Unified Solution for Unlocking and Calibrating Analog ICs., , , , , and . DATE, page 286-289. IEEE, (2020)Design Obfuscation through Selective Post-Fabrication Transistor-Level Programming., , , , , , , and . DATE, page 528-533. IEEE, (2019)Cost-Effective Graceful Degradation in Speculative Processor Subsystems: The Branch Prediction Case., , and . ICCD, page 194-197. IEEE Computer Society, (2003)Integrated optimization of semiconductor manufacturing: A machine learning approach., and . ITC, page 1-10. IEEE Computer Society, (2012)Spatial estimation of wafer measurement parameters using Gaussian process models., , , and . ITC, page 1-8. IEEE Computer Society, (2012)Subtle Anomaly Detection of Microscopic Probes using Deep learning based Image Completion., , , , , and . ITC, page 1-3. IEEE, (2019)Hardware-based workload forensics: Process reconstruction via TLB monitoring., and . HOST, page 167-172. IEEE Computer Society, (2016)