Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware security strategies exploiting nanoelectronic circuits., , , , , and . ASP-DAC, page 368-372. IEEE, (2013)Design Considerations for Multilevel CMOS/Nano Memristive Memory., , and . JETC, 8 (1): 6:1-6:22 (2012)An Application Development Platform for neuromorphic computing., , , , , , , , and . IJCNN, page 1347-1354. IEEE, (2016)Design of Neuromorphic Architectures with Memristors., , , , and . Network Science and Cybersecurity, volume 55 of Advances in Information Security, Springer, (2014)Circuit Techniques for Online Learning of Memristive Synapses in CMOS-Memristor Neuromorphic Systems., , , and . ACM Great Lakes Symposium on VLSI, page 479-482. ACM, (2017)Design for Eliminating Operation Specific Power Signatures from Digital Logic., , , , and . ACM Great Lakes Symposium on VLSI, page 111-116. ACM, (2019)Reliability Analysis of Memristive Reservoir Computing Architecture., , , , , and . ACM Great Lakes Symposium on VLSI, page 131-136. ACM, (2023)Introduction to the Special Issue on Hardware-Assisted Security for Emerging Internet of Things., , , , and . ACM J. Emerg. Technol. Comput. Syst., 18 (1): 1:1-1:3 (2022)A Secure Integrity Checking System for Nanoelectronic Resistive RAM., , , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (2): 416-429 (2019)Spike-Driven Synaptic Plasticity for a Memristive Neuromorphic Core., , and . MWSCAS, page 644-648. IEEE, (2023)