Author of the publication

A Primer on Hardware Security: Models, Methods, and Metrics.

, , and . Proceedings of the IEEE, 102 (8): 1283-1295 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions., , and . INFOCOM, IEEE, (2006)Evolving EDA Beyond its E-Roots: An Overview., and . ICCAD, page 247-254. IEEE, (2015)High-sensitivity hardware trojan detection using multimodal characterization., , , and . DATE, page 1271-1276. EDA Consortium San Jose, CA, USA / ACM DL, (2013)ReBNet: Residual Binarized Neural Network., , and . FCCM, page 57-64. IEEE Computer Society, (2018)DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks., , , and . IJCAI, page 4658-4664. ijcai.org, (2019)FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control., , and . CHES, volume 6917 of Lecture Notes in Computer Science, page 17-32. Springer, (2011)FPGA Time-Bounded Unclonable Authentication., , and . Information Hiding, volume 6387 of Lecture Notes in Computer Science, page 1-16. Springer, (2010)Safe Machine Learning and Defeating Adversarial Attacks., , , and . IEEE Security & Privacy, 17 (2): 31-38 (2019)Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications., , , , , and . IACR Cryptology ePrint Archive, (2017)DeepSecure: Scalable Provably-Secure Deep Learning., , and . IACR Cryptology ePrint Archive, (2017)