Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online Parameter Estimation for Supercapacitor State-of-Energy and State-of-Health Determination in Vehicular Applications., , , , , and . IEEE Trans. Ind. Electron., 67 (9): 7963-7972 (2020)Synthesizing Orchestration Algorithms for FMI 3.0., , and . ANNSIM, page 184-195. IEEE, (2023)An Efficient Sorting Architecture for Area and Energy Constrained Edge Computing Devices., , and . HPCS, page 455-462. IEEE, (2019)Efficient Scheduling of Dependent Tasks in Many-Core Real-Time System Using a Hardware Scheduler., , , , , and . HPEC, page 1-7. IEEE, (2021)Experimental Evaluation of Delayed-Based Detectors Against Power-off Attack., , , , , , , , and . IOLTS, page 1-3. IEEE, (2023)An In-Depth Vulnerability Analysis of RISC-V Micro-Architecture Against Fault Injection Attack., , , , , and . DFT, page 1-6. IEEE, (2021)Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application., , , and . IOLTS, page 1-6. IEEE, (2020)Artificial Intelligence-Based Diagnosis of Hydraulic Centrifugal Pumps Using Vibration Sensor: Feature Extraction and Failure Classification., , , and . ISIE, page 1-6. IEEE, (2023)Security improvement for audio watermarking in image using BCH coding., , , and . CSNDSP, page 1-6. IEEE, (2012)Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection., , , , and . IVSW, page 49-54. IEEE, (2019)