Author of the publication

Fringing Electric Field Sensors for Anti-Attack at System-Level Protection.

, , and . Sensors, 18 (9): 3034 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Trojan Detection Leveraging a Novel Golden Layout Model Towards Practical Applications., , , and . J. Electron. Test., 35 (4): 529-541 (2019)A Numerically Stable Algorithm for Two Server Queue Models., and . Queueing Syst. Theory Appl., 8 (1): 59-79 (1991)A study of a wire-wireless hybrid NoC architecture with an energy-proportional multicast scheme for energy efficiency., , , and . Comput. Electr. Eng., (2015)Random active shield generation based on modified artificial fish-swarm algorithm., , , , and . Comput. Secur., (2020)Weyl Prior and Bayesian Statistics., , and . Entropy, 22 (4): 467 (2020)A study of residual characteristics in floating gate transistors., , , and . Sci. China Inf. Sci., 61 (6): 069402:1-069402:3 (2018)Security Oriented Design Framework for EM Side-Channel Protection in RTL Implementations., , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (8): 2421-2434 (2022)Test Generation for Hardware Trojan Detection Using Correlation Analysis and Genetic Algorithm., , , , , and . ACM Trans. Embed. Comput. Syst., 20 (4): 28:1-28:20 (2021)An Analog-Front ROIC with On-Chip Non-Uniformity Compensation for Diode-Based Infrared Image Sensors., , , and . Sensors, 19 (2): 298 (2019)Data deletion method for security improvement of Flash memories., , , , and . IEICE Electron. Express, 15 (8): 20180152 (2018)