Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sphynx: ReLU-Efficient Network Design for Private Inference., , , , and . CoRR, (2021)CryptoNite: Revealing the Pitfalls of End-to-End Private Inference at Scale., , , , and . CoRR, (2021)An Upper Bound for the Distribution Overlap Index and Its Applications., , , and . CoRR, (2022)R-LPIPS: An Adversarially Robust Perceptual Similarity Metric., , , , and . CoRR, (2023)Characterizing and Optimizing End-to-End Systems for Private Inference., , , , and . CoRR, (2022)Differential Analysis of Triggers and Benign Features for Black-Box DNN Backdoor Detection., , , and . IEEE Trans. Inf. Forensics Secur., (2023)Vertically-addressed test structures (VATS) for 3D IC variability and stress measurements., , and . ISQED, page 96-103. IEEE, (2013)A Feature-Based On-Line Detector to Remove Adversarial-Backdoors by Iterative Demarcation., , , , and . IEEE Access, (2022)Bulls-Eye: Active Few-Shot Learning Guided Logic Synthesis., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (8): 2580-2590 (2023)Training Data Poisoning in ML-CAD: Backdooring DL-Based Lithographic Hotspot Detectors., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (6): 1244-1257 (2021)