Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Healing Design in Deep Scaled CMOS Technologies., , , , and . Journal of Circuits, Systems, and Computers, (2012)Runtime Integrity Verification in Cyber-physical Systems using Side-Channel Fingerprint., , , and . ICCE, page 1-6. IEEE, (2019)Authentication and traceability of food products through the supply chain using NQR spectroscopy., , , , and . BioCAS, page 1-4. IEEE, (2017)Ultralow-power data compression for implantable bladder pressure monitor: Algorithm and hardware implementation., , , , and . BioCAS, page 500-503. IEEE, (2016)Eat, but Verify: Low-Cost Portable Devices for Food Safety Analysis., , , , and . IEEE Consumer Electronics Magazine, 8 (1): 12-18 (2019)Device-Aware Yield-Centric Dual-Vt Design Under Parameter Variations in Nanoscale Technologies., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 15 (6): 660-671 (2007)MAHA: An Energy-Efficient Malleable Hardware Accelerator for Data-Intensive Applications., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 23 (6): 1005-1016 (2015)IOLock: An Input/Output Locking Scheme for Protection Against Reverse Engineering Attacks., , and . IEEE Trans. Very Large Scale Integr. Syst., 32 (2): 347-360 (February 2024)SCOPE: Synthesis-Based Constant Propagation Attack on Logic Locking., , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (8): 1529-1542 (2021)On Database-Free Authentication of Microelectronic Components., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (1): 149-161 (2021)