Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are Adversarial Perturbations a Showstopper for ML-Based CAD? A Case Study on CNN-Based Lithographic Hotspot Detection., , , , , , , and . CoRR, (2019)An Automated Security-Aware Approach for Design of Embedded Systems on MPSoC., , and . ACM Trans. Embedded Comput. Syst., 16 (5s): 143:1-143:20 (2017)Special Session : Machine Learning for Semiconductor Test and Reliability, , , , , , , , , and . 2021 IEEE 39th VLSI Test Symposium (VTS), Piscataway, IEEE, (2021)Robust Deep Learning for IC Test Problems., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (1): 183-195 (2022)Pop Quiz! Can a Large Language Model Help With Reverse Engineering?, , , , , and . CoRR, (2022)A system-level security approach for heterogeneous MPSoCs., , and . DASIP, page 74-81. IEEE, (2016)Achieving GWAS with Homomorphic Encryption., , , , and . IACR Cryptology ePrint Archive, (2019)Zero-Knowledge Elementary Databases with More Expressive Queries., , , and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 255-285. Springer, (2019)Homomorphic Exclusive-Or Operation Enhance Secure Searching on Cloud Storage., , , , and . CloudCom, page 989-994. IEEE Computer Society, (2014)Privacy-Preserved Multi-Party Data Merging with Secure Equality Evaluation., , , and . ICCCRI, page 34-41. IEEE, (2016)