Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging Domain Knowledge using Machine Learning for Image Compression in Internet-of-Things., , and . CoRR, (2020)BINGO: brain-inspired learning memory., and . Neural Comput. Appl., 34 (4): 3223-3247 (2022)SURF: Joint Structural Functional Attack on Logic Locking., , and . HOST, page 181-190. IEEE, (2019)AI-Driven Assurance of Hardware IP against Reverse Engineering Attacks., and . ITC, page 627-636. IEEE, (2022)Hardware Specification Aware Timing Side Channel Security Analysis., , and . SOCC, page 1-6. IEEE, (2023)HASTE: Software Security Analysis for Timing Attacks on Clear Hardware Assumption., , , , and . IEEE Embed. Syst. Lett., 14 (2): 71-74 (2022)An Automated Framework for Board-Level Trojan Benchmarking., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (2): 397-410 (February 2023)LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (4): 854-867 (2022)Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing., , , , and . ACM J. Emerg. Technol. Comput. Syst., 19 (3): 25:1-25:23 (July 2023)Neural Storage: A New Paradigm of Elastic Memory., and . CoRR, (2021)