Author of the publication

Detecting Hardware Trojans with Gate-Level Information-Flow Tracking.

, , , and . Computer, 49 (8): 44-52 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Molecular cloning and expression analysis of the MaASR1 gene in banana and functional characterization under salt stress, , , , , , , and . Electronic Journal of Biotechnology, (2014)Disposing the leftovers under the consignment contract with revenue sharing: Retailer vs supplier., and . J. Systems Science & Complexity, 25 (2): 262-274 (2012)Design of a novel all-CMOS low power voltage reference circuit., , , and . ASICON, page 1-4. IEEE, (2013)Efficient Software Partial Packet Recovery in 802.11 Wireless LANs., , and . IEEE Trans. Computers, 63 (10): 2402-2415 (2014)Communication Protocol Decomposition and Component-based Protocol Submodule., , , and . IASTED Conf. on Software Engineering, page 226-230. IASTED/ACTA Press, (2005)Towards Efficient Concurrent Scans on Flash Disks., , , , , and . DEXA (1), volume 6261 of Lecture Notes in Computer Science, page 198-212. Springer, (2010)Hybrid kinematic and dynamic simulation of running machines., , and . IEEE Trans. Robotics, 21 (3): 490-497 (2005)VDoc+: a virtual document based approach for matching large ontologies using MapReduce., , and . Journal of Zhejiang University - Science C, 13 (4): 257-267 (2012)Employing the One-Sender-Multiple-Receiver Technique in Wireless LANs., , , and . IEEE/ACM Trans. Netw., 21 (4): 1243-1255 (2013)Gpu rasterization based octree fast generation algorithm for terrain modeling., , and . IGARSS, page 282-285. IEEE, (2013)