Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault detection in satellite power system using convolutional neural network., , and . Telecommun. Syst., 76 (4): 505-511 (2021)Enhanced Logical Locking for a Secured Hardware IP Against Key-Guessing Attacks., and . VDAT, volume 892 of Communications in Computer and Information Science, page 186-197. Springer, (2018)A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis., , , , and . IEEE Trans. Emerg. Top. Comput., 5 (2): 260-270 (2017)Low Noise Amplifier at 60 GHz Using Low Loss On-Chip Inductors., , and . J. Electr. Comput. Eng., (2023)Hypervisor for consolidating real-time automotive control units: Its procedure, implications and hidden pitfalls., , , , and . J. Syst. Archit., (2018)Realization of Re-configurable True Random Number Generator on FPGA., and . SSCC, volume 1208 of Communications in Computer and Information Science, page 247-256. Springer, (2019)Obviating Multiple Attacks with Enhanced Logic Locking., , and . IC3, page 162-167. ACM, (2022)A Modified Genetic Algorithm for Evolution of Neural Network in Designing an Evolutionary Neuro-Hardware., , , and . GEM, page 108-111. CSREA Press, (2008)Detection and Diagnosis of Hardware Trojan Using Power Analysis., , , , , and . SSCC, volume 536 of Communications in Computer and Information Science, page 519-529. Springer, (2015)Malicious Circuit Detection for Improved Hardware Security., , , , , , and . SSCC, volume 536 of Communications in Computer and Information Science, page 464-472. Springer, (2015)