Author of the publication

Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities.

, , , , , and . Proc. IEEE, 108 (12): 2214-2231 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modified genetic algorithm-based feature selection combined with pre-trained deep neural network for demand forecasting in outpatient department., , , , and . Expert Syst. Appl., (2017)Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security., and . IEEE Trans. Ind. Electron., 67 (8): 7025-7033 (2020)Interpretable Multimodal Fusion Networks Reveal Mechanisms of Brain Cognition., , , , , , , , , and 1 other author(s). IEEE Trans. Medical Imaging, 40 (5): 1474-1483 (2021)VLSI supply chain security risks and mitigation techniques: A survey., and . Integr., (2016)Voltage Setup Problem for Embedded Systems With Multiple Voltages., and . IEEE Trans. Very Large Scale Integr. Syst., 13 (7): 869-872 (2005)Recent Attacks and Defenses on FPGA-based Systems., and . ACM Trans. Reconfigurable Technol. Syst., 12 (3): 14:1-14:24 (2019)Control Flow Integrity Based on Lightweight Encryption Architecture., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 37 (7): 1358-1369 (2018)AffyProbeMiner: a web resource for computing or retrieving accurately redefined Affymetrix probe sets., , , , , , , , , and 2 other author(s). Bioinform., 23 (18): 2385-2390 (2007)System synthesis of synchronous multimedia applications., and . ACM Trans. Embed. Comput. Syst., 2 (1): 74-97 (2003)Exploring General Intelligence via Gated Graph Transformer in Functional Connectivity Studies., , , , , , , and . CoRR, (2024)