From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Spin-Orbit Torque Devices for Hardware Security: From Deterministic to Probabilistic Regime., , , , и . CoRR, (2019)Guest Editorial: Special Issue On Emerging Technologies in Computer Design., и . IEEE Trans. Emerg. Top. Comput., 9 (1): 5-6 (2021)Guest Editors Introduction: Special Section on Emerging Technologies in Computer Design., и . IEEE Trans. Emerg. Top. Comput., 7 (2): 242-243 (2019)Hide and Seek: Seeking the (Un)-Hidden Key in Provably-Secure Logic Locking Techniques., , и . IEEE Trans. Inf. Forensics Secur., (2022)UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking., , , , , , и . IEEE Trans. Inf. Forensics Secur., (2021)Fa-SAT: Fault-aided SAT-based Attack on Compound Logic Locking Techniques., , и . DATE, стр. 1166-1171. IEEE, (2021)Security Closure of IC Layouts Against Hardware Trojans., , , , , , , , , и . ISPD, стр. 229-237. ACM, (2023)Sneak-path Testing of Memristor-based Memories., , , и . VLSI Design, стр. 386-391. IEEE Computer Society, (2013)ScanSAT: unlocking obfuscated scan chains., , , , , и . ASP-DAC, стр. 352-357. ACM, (2019)A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL., , , и . DATE, стр. 414-419. IEEE, (2019)