Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation F Imeson, A Emtenan, S Garg, MV Tripunitara 22nd USENIX Security Symposium, 495-510, 2013 | 183 | 2013 |
GLNS: An effective large neighborhood search heuristic for the generalized traveling salesman problem SL Smith, F Imeson Computers & Operations Research 87, 1-19, 2017 | 58 | 2017 |
Multi-robot task planning and sequencing using the SAT-TSP language F Imeson, SL Smith 2015 IEEE International Conference on Robotics and Automation (ICRA), 5397-5402, 2015 | 16 | 2015 |
A language for robot path planning in discrete environments: The TSP with Boolean satisfiability constraints F Imeson, SL Smith 2014 IEEE International Conference on Robotics and Automation (ICRA), 5772-5777, 2014 | 16 | 2014 |
An SMT-based approach to motion planning for multiple robots with complex constraints F Imeson, SL Smith IEEE Transactions on Robotics 35 (3), 669-684, 2019 | 5 | 2019 |
Non-deterministic timers for hardware trojan activation (or how a little randomness can go the wrong way) F Imeson, S Nejati, S Garg, M Tripunitara 10th {USENIX} Workshop on Offensive Technologies ({WOOT} 16), 2016 | 4 | 2016 |
Clustering in discrete path planning for approximating minimum length paths F Imeson, SL Smith 2017 American Control Conference (ACC), 2968-2973, 2017 | 2 | 2017 |
Robotic path planning for high-level tasks in discrete environments F Imeson University of Waterloo, 2018 | 1 | 2018 |
The Need for Declarative Properties in Digital IC Security M El Massad, F Imeson, S Garg, M Tripunitara Proceedings of the on Great Lakes Symposium on VLSI 2017, 333-338, 2017 | | 2017 |
Sec’13: 22nd USENIX Security Symposium X Ge, F Imeson, MN Bhushan Jain, R Pandita, J Scire, M Wählisch, ... | | 2013 |
An Attack and a Defence in the Context of Hardware Security F Imeson University of Waterloo, 2013 | | 2013 |