From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Comparative analysis of hybrid Magnetic Tunnel Junction and CMOS logic circuits., , , и . SoCC, стр. 259-264. IEEE, (2016)Experimental Data Anomaly Detection at Edge Sensor Nodes Using Physics Laws., , и . J. Hardw. Syst. Secur., 5 (1): 19-31 (2021)Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis., , , и . DFT, стр. 87-95. IEEE Computer Society, (2008)Special Session: Countering IP Security threats in Supply chain., , , , , и . VTS, стр. 1-9. IEEE, (2019)Assessment of Message Missing Failures in CAN-based Systems., и . Parallel and Distributed Computing and Networks, стр. 387-392. IASTED/ACTA Press, (2005)Preventing design reverse engineering with reconfigurable spin transfer torque LUT gates., , , и . ISQED, стр. 242-247. IEEE, (2016)Reliability analysis of spin transfer torque based look up tables under process variations and NBTI aging., , , и . Microelectron. Reliab., (2016)COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist.. IEEE Trans. Inf. Forensics Secur., 12 (2): 338-350 (2017)Session details: Session 6B: Special Session - 2: Application-oriented Hardware Security Challenges and Solutions.. ACM Great Lakes Symposium on VLSI, ACM, (2022)Layout-Aware Pattern Evaluation and Analysis for Power-Safe Application of Transition Delay Fault Patterns., , , , , и . J. Low Power Electron., 8 (2): 248-258 (2012)