Author of the publication

SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters.

, , , , , and . IEEE Des. Test, 37 (2): 58-65 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A self-learning framework to detect the intruded integrated circuits., , , , , and . ISCAS, page 1702-1705. IEEE, (2016)SIMCom: Statistical Sniffing of Inter-Module Communications for Run-time Hardware Trojan Detection., , , , and . CoRR, (2019)Toward Model Checking-Driven Fair Comparison of Dynamic Thermal Management Techniques Under Multithreaded Workloads., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (8): 1725-1738 (2020)InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device(s) in IoT for Hardware Trojan Detection., , , , and . HASP@MICRO, page 8:1-8:8. ACM, (2021)LaBaNI: Layer-based Noise Injection Attack on Convolutional Neural Networks., , and . ACM Great Lakes Symposium on VLSI, page 143-146. ACM, (2022)VAWS: Vulnerability Analysis of Neural Networks using Weight Sensitivity., , , and . MWSCAS, page 650-653. IEEE, (2019)A Roadmap Toward the Resilient Internet of Things for Cyber-Physical Systems., , , , , and . IEEE Access, (2019)FM-ModComp: Feature Map Modification and Hardware-Software Co-Comparison for secure hardware accelerator-based CNN inference., , , and . Microprocess. Microsystems, (July 2023)FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack., , , , and . CoRR, (2021)ForASec: Formal Analysis of Security Vulnerabilities in Sequential Circuits., , , , and . CoRR, (2018)