Author of the publication

Automated Hardware Trojan Detection at LUT Using Explainable Graph Neural Networks.

, , , , , and . ICCAD, page 1-9. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Relay in Narrow-Band Communications for Ubiquitous IoT Access., , , , and . J. Sensors, (2017)Hardware Trojan Detection at LUT: Where Structural Features Meet Behavioral Characteristics., , , and . HOST, page 121-124. IEEE, (2022)Automated Hardware Trojan Detection at LUT Using Explainable Graph Neural Networks., , , , , and . ICCAD, page 1-9. IEEE, (2023)Arbitrarily slow convergence of reconstruction from nonuniform sample., , and . Signal Process., (2020)Query by Drawing Examples of UML Model., , and . APSEC Workshops, page 154-157. IEEE, (2012)Autonomous Incident Detection on Spectrometers Using Deep Convolutional Models., , , , , , and . Sensors, 22 (1): 160 (2022)Application of Multiple-Optimization Filtering Algorithm in Remote Sensing Image Denoising., , , , , and . Sensors, 23 (18): 7813 (September 2023)Fuzzy embed into PI control algorithm of Switched Reluctance Motor., , , , and . ICIA, page 505-509. IEEE, (2013)Neural partially linear additive model., , , , and . Frontiers Comput. Sci., 18 (6): 186334 (December 2024)Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks., , , , , , , , and . J. Medical Syst., 40 (7): 171:1-171:8 (2016)