Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)., , and . CoRR, (2019)Survey on recent counterfeit IC detection techniques and future research directions., and . Integr., (2019)MacLeR: Machine Learning-Based Runtime Hardware Trojan Detection in Resource-Constrained IoT Edge Devices., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (11): 3748-3761 (2020)Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks., , and . IEEE Access, (2020)Area efficient soft error tolerant RISC pipeline: Leveraging data encoding and inherent ALU redundancy., and . MWSCAS, page 699-702. IEEE, (2017)Behavior profiling of power distribution networks for runtime hardware trojan detection., , , and . MWSCAS, page 1316-1319. IEEE, (2017)Soft error aware pipelined architecture: Leveraging automatic repeat request protocol., and . MWSCAS, page 549-552. IEEE, (2013)Hardening Hardware Accelerartor Based CNN Inference Phase Against Adversarial Noises., , and . HOST, page 141-144. IEEE, (2022)Edge Intelligence in Mobile Nodes: Opportunistic Pipeline via 5G D2D for On-site Sensing., , and . VTC Fall, page 1-5. IEEE, (2022)Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors., , , and . AsianHOST, page 1-6. IEEE Computer Society, (2016)