Author of the publication

Finding Compact BDDs Using Genetic Programming

, and . Applications of Evolutionary Computing, EvoWorkshops2006: EvoBIO, EvoCOMNET, EvoHOT, EvoIASP, EvoInteraction, EvoMUSART, EvoSTOC, volume 3907 of LNCS, page 308--319. Budapest, Springer Verlag, (10-12 April 2006)
DOI: doi:10.1007/11732242_28

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks., , , and . ACNS (1), volume 12726 of Lecture Notes in Computer Science, page 363-392. Springer, (2021)Finding Compact BDDs Using Genetic Programming, and . Applications of Evolutionary Computing, EvoWorkshops2006: EvoBIO, EvoCOMNET, EvoHOT, EvoIASP, EvoInteraction, EvoMUSART, EvoSTOC, volume 3907 of LNCS, page 308--319. Budapest, Springer Verlag, (10-12 April 2006)Formale Verifikation des Befehlssatzes eines SystemC Mikroprozessors., , and . GI Jahrestagung (1), volume P-67 of LNI, page 308-312. GI, (2005)Side channel attacks for architecture extraction of neural networks., , , and . CAAI Trans. Intell. Technol., 6 (1): 3-16 (2021)Finding Optimal Moving Target Defense Strategies: A Resilience Booster for Connected Cars., , and . Inf., 13 (5): 242 (2022)Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks., , , and . SPACE, volume 13162 of Lecture Notes in Computer Science, page 148-167. Springer, (2021)Run or Hide? Both! A Method Based on IPv6 Address Switching to Escape While Being Hidden., , and . MTD@CCS, page 47-56. ACM, (2019)LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection., , , and . DSD, page 269-276. IEEE, (2019)Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks., , , , , , , and . COSADE, volume 12244 of Lecture Notes in Computer Science, page 254-274. Springer, (2020)Analysis and Protection of the Two-Metric Helper Data Scheme., , , and . COSADE, volume 12910 of Lecture Notes in Computer Science, page 279-302. Springer, (2021)