Search

Your search keyword '"Basu, Kanad"' showing total 35 results

Search Constraints

Start Over You searched for: Author "Basu, Kanad" Remove constraint Author: "Basu, Kanad" Language english Remove constraint Language: english
35 results on '"Basu, Kanad"'

Search Results

3. Real-time artificial intelligence enhanced defect engineering in CeO2 nanostructures.

6. Machine Learning-enhanced Efficient Spectroscopic Ellipsometry Modeling

7. Special Session: Reliability Analysis for ML/AI Hardware

8. Explainable Machine Learning for Intrusion Detection via Hardware Performance Counters.

9. Logic Locking of Integrated Circuits Enabled by Nanoscale MoS2‑Based Memtransistors.

10. A Security Analysis of Circuit Clock Obfuscation.

11. RTL-ConTest: Concolic Testing on RTL for Detecting Security Vulnerabilities.

12. Real-Time Hardware-Based Malware and Micro-Architectural Attack Detection Utilizing CMOS Reservoir Computing.

13. Runtime Malware Detection Using Embedded Trace Buffers.

14. Machine learning approach to thickness prediction from in situ spectroscopic ellipsometry data for atomic layer deposition processes.

15. WiND: An Efficient Post-Silicon Debug Strategy for Network on Chip.

16. In situ ellipsometry aided rapid ALD process development and parameter space visualization of cerium oxide nanofilms.

17. Defending Hardware-Based Malware Detectors Against Adversarial Attacks.

18. Hardware Performance Counters: Ready-Made vs Tailor-Made.

19. Toward Functional Safety of Systolic Array-Based Deep Learning Hardware Accelerators.

20. A Theoretical Study of Hardware Performance Counters-Based Malware Detection.

21. A Methodology to Capture Fine-Grained Internal Visibility During Multisession Silicon Debug.

22. Post-Silicon Gate-Level Error Localization With Effective and Combined Trace Signal Selection.

23. PREEMPT: PReempting Malware by Examining Embedded Processor Traces.

24. Black-Hat High-Level Synthesis: Myth or Reality?

28. Observability-aware Directed Test Generation for Soft Errors and Crosstalk Faults.

29. Constrained signal selection for post-silicon validation.

32. RATS: Restoration-Aware Trace Signal Selection for Post-Silicon Validation.

33. Test Data Compression Using Efficient Bitmask and Dictionary Selection Methods.

35. Satisfiability Attack-Resistant Camouflaged Two-Dimensional Heterostructure Devices.

Catalog

Books, media, physical & digital resources