Author of the publication

A Survey of Hardware Trojan Detection, Diagnosis and Prevention.

, , , and . CAD/Graphics, page 173-180. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services., , and . SEC, volume 214 of IFIP Conference Proceedings, page 239-250. Kluwer, (2002)Secure M-commerce Transactions: A Third Party Based Signature Protocol., , , and . IAS, page 3-8. IEEE Computer Society, (2007)Incremental concept-cognitive learning based on attribute topology., , , and . Int. J. Approx. Reason., (2020)Energy Efficient Sequential Sensing for Wideband Multi-Channel Cognitive Network., , and . ICC, page 1-5. IEEE, (2011)Rapid automatic detection method for road identification on the highways., , , , and . IECON, page 6308-6311. IEEE, (2017)Automated healing approach in cloud base-station with high load using RRUs cooperation., , , , and . GLOBECOM Workshops, page 285-290. IEEE, (2012)MoRule: Optimized rule placement for mobile users in SDN-enabled access networks., , and . GLOBECOM, page 4953-4958. IEEE, (2014)Block-spectral mapping for multi-scale solution.. J. Comput. Phys., (2013)CNN Descriptor Improvement Based on L2-Normalization and Feature Pooling for Patch Classification., , , , , , , and . ROBIO, page 144-149. IEEE, (2018)Adaptive Density Graph-Based Manifold Alignment for Fingerprinting Indoor Localization., , , , , and . IEEE Access, (2020)