Author of the publication

Dynamic Data-Dependent Reference to Improve Sense Margin and Speed of Magnetoresistive Random Access Memory.

, , , , , , , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 64-II (2): 186-190 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A low cost and high reliability true random number generator based on resistive random access memory., , , , , , , and . ASICON, page 1-4. IEEE, (2015)Low-Power Variation-Tolerant Nonvolatile Lookup Table Design., , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 24 (3): 1174-1178 (2016)DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Using deep learning to solve computer security challenges: a survey., , , , , , , and . Cybersecur., 3 (1): 15 (2020)Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security., , , and . IWSPA@CODASPY, page 43-52. ACM, (2020)Dynamic Data-Dependent Reference to Improve Sense Margin and Speed of Magnetoresistive Random Access Memory., , , , , , , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 64-II (2): 186-190 (2017)Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks., , , and . CoRR, (2020)Variation-tolerant CuxSiyO-based RRAM for low power application., , , , , , , , and . IEICE Electron. Express, 9 (21): 1654-1659 (2012)An Approach for Detection of Advanced Persistent Threat Attacks., , , and . Computer, 53 (12): 92-96 (2020)Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach., , , and . J. Comput. Secur., 30 (4): 541-570 (2022)