Author of the publication

Rebuttal to "Comments on 'A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing"'.

, and . IEEE Trans. Inf. Forensics Secur., 11 (11): 2626-2627 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rejection of Multitone Jamming for FFH/MFSK Spread-Spectrum Systems over Frequency-Selective Rayleigh-Fading Channels., , and . VTC Spring, page 688-692. IEEE, (2008)Secrecy Analysis of Wireless-Powered Multi-Antenna Relaying System With Nonlinear Energy Harvesters and Imperfect CSI., , and . TGCN, 2 (2): 460-470 (2018)Adversarial Examples: Attacks on Machine Learning-based Malware Visualization Detection Methods., , , and . CoRR, (2018)Design and Application of Biomimetic Memory Circuit Based on Hippocampus Mechanism., , , , and . IEEE Trans. Cogn. Dev. Syst., 15 (3): 1289-1300 (September 2023)Approximation Attacks on Strong PUFs., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (10): 2138-2151 (2020)Outage performance for full-duplex relaying satellite-terrestrial multi-antenna NOMA systems with imperfect SIC., , and . Digit. Signal Process., (April 2023)Time Efficient Joint UAV-BS Deployment and User Association based on Machine Learning., , , and . CoRR, (2022)Degrees of Freedom in 3D Linear Large-Scale Antenna Array Communications-A Spatial Bandwidth Approach., , and . CoRR, (2022)On the performance of an integrated communication and localization system: an analytical framework., , , , , and . CoRR, (2023)Evaluation of Building Wireless Performance for Indoor Device-to-Device Networks., , , , and . IEEE Trans. Green Commun. Netw., 8 (1): 150-161 (March 2024)