Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Improving Hotspot Detection Through Synthetic Pattern-Based Database Enhancement., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (12): 2522-2527 (2021)Yield Forecasting Across Semiconductor Fabrication Plants and Design Generations., , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 36 (12): 2120-2133 (2017)Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks., , , , , and . CoRR, (2020)Amplitude-Modulating Analog/RF Hardware Trojans in Wireless Networks: Risks and Remedies., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Demonstrating and Mitigating the Risk of an FEC-Based Hardware Trojan in Wireless Networks., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (10): 2720-2734 (2019)Statistical Methods for Detecting Recycled Electronics: From ICs to PCBs and Beyond., , , , and . IEEE Des. Test, 41 (2): 15-22 (2024)Cost-Effective Graceful Degradation in Speculative Processor Subsystems: The Branch Prediction Case., , and . ICCD, page 194-197. IEEE Computer Society, (2003)A field programmable transistor array featuring single-cycle partial/full dynamic reconfiguration., , , , , and . DATE, page 1336-1341. IEEE, (2017)Hardware-assisted rootkit detection via on-line statistical fingerprinting of process execution., and . DATE, page 1580-1585. IEEE, (2018)Design Obfuscation through Selective Post-Fabrication Transistor-Level Programming., , , , , , , and . DATE, page 528-533. IEEE, (2019)