From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation., , , и . Inf., 14 (9): 516 (2023)Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network., и . CoRR, (2019)Approximate MRAM: High-Performance and Power-Efficient Computing With MRAM Chips for Error-Tolerant Applications., , и . IEEE Trans. Computers, 72 (3): 668-681 (марта 2023)Unsupervised IC Security with Machine Learning for Trojan Detection., , , , и . MWSCAS, стр. 20-24. IEEE, (2023)Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin., , , , и . HOST, стр. 111-121. IEEE, (2020)Secure Split-Test for preventing IC piracy by untrusted foundry and assembly., , и . DFTS, стр. 196-203. IEEE Computer Society, (2013)PreLatPUF: Exploiting DRAM Latency Variations for Generating Robust Device Signatures., , , и . IEEE Access, (2019)A Noninvasive Technique to Detect Authentic/Counterfeit SRAM Chips., , и . ACM J. Emerg. Technol. Comput. Syst., 19 (2): 11:1-11:25 (апреля 2023)Approximate MRAM: High-performance and Power-efficient Computing with MRAM Chips for Error-tolerant Applications., , и . CoRR, (2021)LDPUF: Exploiting DRAM Latency Variations to Generate Robust Device Signatures., , , , и . CoRR, (2018)