Author of the publication

Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side Channel.

, , , , and . Secur. Commun. Networks, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Trojan Detection Leveraging a Novel Golden Layout Model Towards Practical Applications., , , and . J. Electron. Test., 35 (4): 529-541 (2019)Security Oriented Design Framework for EM Side-Channel Protection in RTL Implementations., , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (8): 2421-2434 (2022)Test Generation for Hardware Trojan Detection Using Correlation Analysis and Genetic Algorithm., , , , , and . ACM Trans. Embed. Comput. Syst., 20 (4): 28:1-28:20 (2021)A study of residual characteristics in floating gate transistors., , , and . Sci. China Inf. Sci., 61 (6): 069402:1-069402:3 (2018)Weyl Prior and Bayesian Statistics., , and . Entropy, 22 (4): 467 (2020)Random active shield generation based on modified artificial fish-swarm algorithm., , , , and . Comput. Secur., (2020)A study of a wire-wireless hybrid NoC architecture with an energy-proportional multicast scheme for energy efficiency., , , and . Comput. Electr. Eng., (2015)A Numerically Stable Algorithm for Two Server Queue Models., and . Queueing Syst. Theory Appl., 8 (1): 59-79 (1991)An Analog-Front ROIC with On-Chip Non-Uniformity Compensation for Diode-Based Infrared Image Sensors., , , and . Sensors, 19 (2): 298 (2019)Data deletion method for security improvement of Flash memories., , , , and . IEICE Electron. Express, 15 (8): 20180152 (2018)