Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LASCA: Learning Assisted Side Channel Delay Analysis for Hardware Trojan Detection., , , , , and . ISQED, page 40-45. IEEE, (2020)Impact of the switching activity on the aging of delay-PUFs., , , and . ETS, page 1-2. IEEE, (2017)A Networked System Dependability Validation Framework Using Physical and Virtual Nodes., , , , , , and . IEEE Access, (2023)Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks., , , , and . DATE, page 1000-1005. IEEE, (2021)DELFINES: Detecting Laser Fault Injection Attacks via Digital Sensors., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (3): 774-787 (March 2024)Security Vulnerabilities of Emerging Nonvolatile Main Memories and Countermeasures., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 34 (1): 2-15 (2015)Exploring the Effect of Device Aging on Static Power Analysis Attacks., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (3): 233-256 (2019)Reliable NoC architecture utilizing a robust rerouting algorithm., , , , and . EWDTS, page 200-203. IEEE Computer Society, (2008)Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks., , , , and . ICICDT, page 10-15. IEEE, (2023)Special Session: On the Reliability of Conventional and Quantum Neural Network Hardware., , , , , , , and . VTS, page 1-12. IEEE, (2022)