Author of the publication

Transient and Permanent Error Control for High-End Multiprocessor Systems-on-Chip.

, , , and . NOCS, page 169-176. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing FPGA-based obsolete component replacement for legacy systems., , , , and . ISQED, page 401-406. IEEE, (2018)A Dual-Layer Method for Transient and Permanent Error Co-Management in NoC Links., and . IEEE Trans. Circuits Syst. II Express Briefs, 58-II (1): 36-40 (2011)An Orthogonal Algorithm for Key Management in Hardware Obfuscation., , , , , , and . AsianHOST, page 1-4. IEEE, (2019)Mitigating Control Flow Attacks in Embedded Systems with Novel Built-in Secure Register Bank., , , and . ACM Great Lakes Symposium on VLSI, page 483-486. ACM, (2017)Transient error management for partially adaptive router in network-on-chip (NoC)., and . ISCAS, page 1672-1675. IEEE, (2012)A hardened network-on-chip design using runtime hardware Trojan mitigation methods., and . Integr., (2017)Explainable fault diagnosis of gas-liquid separator based on fully convolutional neural network., , , , , , and . Comput. Chem. Eng., (2021)INEAD: Intermediate Node Evaluation-Based Attack Detection for Secure Approximate Computing Systems., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (3): 716-727 (March 2024)Hardware Security Risks and Threat Analyses in Advanced Manufacturing Industry., , and . ACM Trans. Design Autom. Electr. Syst., 28 (5): 83:1-83:22 (September 2023)Exploiting state obfuscation to detect hardware trojans in NoC network interfaces., and . MWSCAS, page 1-4. IEEE, (2015)