Cited By
View all- Chen ZChen LZhao XLi KSchmidt HPolian IDu N(2025)Protected memristive implementations of cryptographic functionsPhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences10.1098/rsta.2023.0389383:2288Online publication date: 16-Jan-2025
- Heynssens JGarrard JBurke ICambou B(2024)Current sensor fingerprint for real-time failure detection and transceiver identification in autonomous systems controlled by artificial intelligence (AI)Autonomous Systems: Sensors, Processing, and Security for Ground, Air, Sea, and Space Vehicles and Infrastructure 202410.1117/12.3011855(1)Online publication date: 7-Jun-2024
- Bhagya Hiremath SVijayakumar C(2024)Analysis of Memristor Neural Networks for fault Tolerant Computing2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS)10.1109/ICKECS61492.2024.10617381(1-8)Online publication date: 18-Apr-2024
- Show More Cited By