| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | — | conf |
ICECS
|
| 2025 | — | conf |
NewCAS
|
| 2024 | J | jnl |
Acta Cybern.
|
| 2024 | C | conf |
DSD
|
| 2024 | J | jnl |
Expert Syst. Appl.
|
| 2024 | J | jnl |
Acta Cybern.
|
| 2023 | J | jnl |
Digit. Signal Process.
|
| 2022 | — | conf |
NEWCAS
|
| 2022 | — | ch. |
Protecting Behavioral IPs During Design Time: Key-Based Obfuscation Techniques for HLS in the Cloud.
Behavioral Synthesis for Hardware Security
|
| 2021 | A | conf |
DATE
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2019 | A | conf |
DATE
|
| 2018 | — | conf |
ReCoSoC
|
| 2017 | J | jnl |
J. Syst. Archit.
|
| 2017 | — | conf |
ARC
|
| 2016 | — | conf |
DASIP
|
| 2015 | — | conf |
ISVLSI
|
| 2014 | — | conf |
SpringSim (HPS)
|
| 2014 | — | conf |
ReCoSoC
|
| 2014 | J | jnl |
Sci. Comput. Program.
|
| 2012 | — | conf |
DASIP
|
| 2012 | — | conf |
HPCC-ICESS
|
| 2010 | B | conf |
ECMFA
|
| 2003 | J | jnl |
J. Circuits Syst. Comput.
|
| 2002 | — | — |
|
| 2001 | J | jnl |
J. Syst. Archit.
|