Author of the publication

Part I: Evaluation for Hardware Trojan Detection Based on Electromagnetic Radiation.

, , , and . J. Electron. Test., 36 (5): 591-606 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Alignment With Polar Contrastive Learning for Next-Basket Recommendation., , , , and . IEEE Trans. Knowl. Data Eng., 36 (1): 199-210 (January 2024)Basket Booster for Prototype-based Contrastive Learning in Next Basket Recommendation., , , and . ECML/PKDD (1), volume 13713 of Lecture Notes in Computer Science, page 574-589. Springer, (2022)MCRec: Multi-channel Gated Gifts Recommendation., , , and . ICDM, page 548-557. IEEE, (2023)High-Performance Estimation of Jamming Covariance Matrix for IRS-Aided Directional Modulation Network With a Malicious Attacker., , , , , , and . IEEE Trans. Veh. Technol., 71 (9): 10137-10142 (2022)Software Engineering for OpenHarmony: A Research Roadmap., , , , , , , , , and 5 other author(s). CoRR, (2023)Low Complex Beam-Space Beamformer for Medical Ultrasound Imaging Based on Delay Multiply and Sum Method., , , , and . J. Medical Imaging Health Informatics, 9 (8): 1630-1638 (2019)Effectively Finding ICC-related Bugs in Android Apps via Reinforcement Learning., , , , and . ISSRE, page 403-414. IEEE, (2023)iFixDataloss: a tool for detecting and fixing data loss issues in Android apps., , , , , and . ISSTA, page 785-788. ACM, (2022)An empirical assessment of security risks of global Android banking apps., , , , , , , and . ICSE, page 1310-1322. ACM, (2020)Deep differential testing of JVM implementations., , and . ICSE, page 1257-1268. IEEE / ACM, (2019)