Author of the publication

Toward Building and Optimizing Trustworthy Systems Using Untrusted Components: A Graph-Theoretic Perspective.

, , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (5): 1386-1399 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Trojan Detection Using the Order of Path Delay., , , and . ACM J. Emerg. Technol. Comput. Syst., 14 (3): 33:1-33:23 (2018)Analysis of Electromagnetic Information Leakage Based on Cryptographic Integrated Circuits., , , , , and . Entropy, 23 (11): 1508 (2021)Side-Channel Attacks Based on Deep Learning., , , and . AAIA, page 33-37. ACM, (2023)Can flexible, domain specific programmable logic prevent IP theft?, , , and . DFT, page 153-157. IEEE Computer Society, (2016)Worst-Case Finish Time Analysis for DAG-Based Applications in the Presence of Transient Faults., , , and . J. Comput. Sci. Technol., 31 (2): 267-283 (2016)Hybrid Threshold Denoising Framework Using Singular Value Decomposition for Side-Channel Analysis Preprocessing., , , , , , , and . Entropy, 25 (8): 1133 (August 2023)A Convolutional Encoder Network for Intrusion Detection in Controller Area Networks., , , and . CIS, page 366-369. IEEE, (2020)Hardware Trojan detection using path delay order encoding with process variation tolerance., , and . ETS, page 1-2. IEEE, (2018)Toward Building and Optimizing Trustworthy Systems Using Untrusted Components: A Graph-Theoretic Perspective., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (5): 1386-1399 (2022)Split Manufacturing-Based Register Transfer-Level Obfuscation., , , , and . ACM J. Emerg. Technol. Comput. Syst., 15 (1): 11:1-11:22 (2019)