From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance Comparison of Contemporary DNN Watermarking Techniques., , , , и . CoRR, (2018)A Unified Submodular Framework for Multimodal IC Trojan Detection., , и . Information Hiding, том 6387 из Lecture Notes in Computer Science, стр. 17-32. Springer, (2010)Decentralized Bayesian Learning over Graphs., , , , , и . CoRR, (2019)Processors for Mobile Applications., , , и . ICCD, стр. 603-608. IEEE Computer Society, (2000)Coding-based energy minimization for phase change memory., , и . DAC, стр. 68-76. ACM, (2012)Deepsecure: scalable provably-secure deep learning., , и . DAC, стр. 2:1-2:6. ACM, (2018)MAXelerator: FPGA accelerator for privacy preserving multiply-accumulate (MAC) on cloud servers., , , и . DAC, стр. 33:1-33:6. ACM, (2018)Exposure in wireless Ad-Hoc sensor networks., , , и . MobiCom, стр. 139-150. ACM, (2001)SVD-Based Ghost Circuitry Detection., , , и . Information Hiding, том 5806 из Lecture Notes in Computer Science, стр. 221-234. Springer, (2009)Integration of Statistical Techniques in the Design Curriculum., и . MSE, стр. 153-154. IEEE Computer Society, (2007)