Author of the publication

GateLock: Input-Dependent Key-Based Locked Gates for SAT Resistant Logic Locking.

, , , and . IEEE Trans. Very Large Scale Integr. Syst., 32 (2): 361-371 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Significance driven inverse distance weighted filter to restore impulsive noise corrupted X-ray image., , and . J. Ambient Intell. Humaniz. Comput., 13 (4): 2013-2024 (2022)A Lightweight Robust Logic Locking Technique to Thwart Sensitization and Cone-Based Attacks., and . IEEE Trans. Emerg. Top. Comput., 9 (2): 811-822 (2021)New Light Weight Threshold Voltage Defined Camouflaged Gates for Trustworthy Designs., , and . J. Electron. Test., 33 (5): 657-668 (2017)A new hardware Trojan detection technique using deep convolutional neural network., , , and . Integr., (2021)Multiview deep learning-based attack to break text-CAPTCHAs., , , and . Int. J. Mach. Learn. Cybern., 14 (3): 959-972 (March 2023)Cooperative Geometric Scheme for Passive Localization of Target in an Indoor Environment., , , and . SSCI, page 238-245. IEEE, (2022)A New ATPG and Online Monitoring based Technique for Hardware Trojan Detection., and . Microprocess. Microsystems, (2023)An Energy-Efficient Trusted FSM Design Technique to Thwart Fault Injection and Trojan Attacks., , and . VLSID, page 73-78. IEEE Computer Society, (2018)Multi-Objective Optimization Based Test Pattern Generation for Hardware Trojan Detection., , , and . J. Electron. Test., 39 (3): 371-385 (June 2023)Security analysis of image CAPTCHA using a mask R-CNN-based attack model., , , and . Int. J. Ad Hoc Ubiquitous Comput., 36 (4): 238-247 (2021)