Author of the publication

FPGA IP protection by binding Finite State Machine to Physical Unclonable Function.

, , , , , , , and . FPL, page 1-4. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies., , , and . CCS, page 195-209. ACM, (2019)Optimal Schedule of Mobile Edge Computing Under Imperfect CSI., , , , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 32-45. Springer, (2018)FPGA IP protection by binding Finite State Machine to Physical Unclonable Function., , , , , , , and . FPL, page 1-4. IEEE, (2013)What Makes a Great Mobile App? A Quantitative Study Using a New Mobile Crawler., , , , , and . SOSE, page 222-227. IEEE Computer Society, (2018)UCPR: User Classification and Influence Analysis in Social Network., , , and . ICDCS Workshops, page 311-315. IEEE Computer Society, (2017)Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit., , , , , , , and . HPCA, page 31-45. IEEE, (2024)Model Checking for Microarchitectural Data Sampling Security., , , , , and . DSC, page 56-63. IEEE, (2022)Control Flow Integrity Based on Lightweight Encryption Architecture., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 37 (7): 1358-1369 (2018)Processor Vulnerability Discovery., , and . DAC, page 1-3. IEEE, (2023)Mitigating Adversarial Attacks for Deep Neural Networks by Input Deformation and Augmentation., , , , , and . ASP-DAC, page 157-162. IEEE, (2020)