Author of the publication

Multilevel design understanding: from specification to logic (invited paper).

, , , and . ICCAD, page 133. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mechanized Information Flow Analysis through Inductive Assertions., , , and . FMCAD, page 1-4. IEEE, (2008)Modeling and verification of industrial flash memories., , , and . ISQED, page 705-712. IEEE, (2010)Using ACL2 to Verify Loop Pipelining in Behavioral Synthesis., , , and . ACL2, volume 152 of EPTCS, page 111-128. (2014)Exploiting design-for-debug for flexible SoC security architecture., , and . DAC, page 167:1-167:6. ACM, (2016)Handling design and implementation optimizations in equivalence checking for behavioral synthesis., , , and . DAC, page 117:1-117:6. ACM, (2013)Proof Styles in Operational Semantics., and . FMCAD, volume 3312 of Lecture Notes in Computer Science, page 67-81. Springer, (2004)Combining Theorem Proving with Model Checking through Predicate Abstraction., and . IEEE Des. Test Comput., 24 (2): 132-139 (2007)Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice., , , , , , and . J. Hardw. Syst. Secur., 2 (2): 97-110 (2018)Guarding Deep Learning Systems With Boosted Evasion Attack Detection and Model Update., , , and . IEEE Internet Things J., 11 (6): 9382-9391 (March 2024)Resilient Cooperative Adaptive Cruise Control for Autonomous Vehicles Using Machine Learning., , and . CoRR, (2021)