Author of the publication

Hardware-based anti-counterfeiting techniques for safeguarding supply chain integrity.

, , and . ISCAS, page 1-4. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks., , , and . AsianHOST, page 7-12. IEEE, (2018)Memristors for Secret Sharing-Based Lightweight Authentication., and . IEEE Trans. Very Large Scale Integr. Syst., 26 (12): 2671-2683 (2018)ADLPT: Improving 3D NAND Flash Memory Reliability by Adaptive Lifetime Prediction Techniques., , , , , , and . IEEE Trans. Computers, 72 (6): 1525-1538 (June 2023)VOLtA: Voltage over-scaling based lightweight authentication for IoT applications., , and . ASP-DAC, page 336-341. IEEE, (2017)MIDAS: Model Inversion Defenses Using an Approximate Memory System., , and . AsianHOST, page 1-4. IEEE, (2020)An RRAM-Based Computing-in-Memory Architecture and Its Application in Accelerating Transformer Inference., , , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 32 (3): 485-496 (March 2024)RIME: A Scalable and Energy-Efficient Processing-In-Memory Architecture for Floating-Point Operations., , and . ASP-DAC, page 120-125. ACM, (2021)RRAM Based Lightweight User Authentication., and . ICCAD, page 139-145. IEEE, (2015)Voltage Over-Scaling-Based Lightweight Authentication for IoT Security., , , , and . IEEE Trans. Computers, 71 (2): 323-336 (2022)Approximation on Data Flow Graph Execution for Energy Efficiency., , and . Approximate Computing, Springer International Publishing, (2022)