Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security., and . IEEE Trans. Ind. Electron., 67 (8): 7025-7033 (2020)Interpretable Multimodal Fusion Networks Reveal Mechanisms of Brain Cognition., , , , , , , , , and 1 other author(s). IEEE Trans. Medical Imaging, 40 (5): 1474-1483 (2021)Voltage Setup Problem for Embedded Systems With Multiple Voltages., and . IEEE Trans. Very Large Scale Integr. Syst., 13 (7): 869-872 (2005)VLSI supply chain security risks and mitigation techniques: A survey., and . Integr., (2016)Recent Attacks and Defenses on FPGA-based Systems., and . ACM Trans. Reconfigurable Technol. Syst., 12 (3): 14:1-14:24 (2019)Modified genetic algorithm-based feature selection combined with pre-trained deep neural network for demand forecasting in outpatient department., , , , and . Expert Syst. Appl., (2017)Embedded Digital Signal Processing Systems., , and . EURASIP J. Embed. Syst., (2007)Lightning: Striking the Secure Isolation on GPU Clouds with Transient Hardware Faults., , , , , and . CoRR, (2021)SPECRUN: The Danger of Speculative Runahead Execution in Processors., , and . CoRR, (2023)A 3-D hand gesture signature based biometric authentication system for smartphones., , , and . Secur. Commun. Networks, 9 (11): 1359-1373 (2016)