Alexander Wild

Orcid: 0000-0002-2120-9503

According to our database1, Alexander Wild authored at least 17 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Multi-donor Neural Transfer Learning for Genetic Programming.
ACM Trans. Evol. Learn. Optim., 2022

2021
Neurally guided transfer learning for genetic programming.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

2019
General Program Synthesis Using Guided Corpus Generation and Automatic Refactoring.
Proceedings of the Search-Based Software Engineering - 11th International Symposium, 2019

Code Synthesis in Self-Improving Software Systems.
Proceedings of the IEEE 4th International Workshops on Foundations and Applications of Self* Systems, 2019

Automated Probe Repositioning for On-Die EM Measurements.
Proceedings of the International Conference on Computer-Aided Design, 2019

2018
Structure-aware design of security primitives on reconfigurable hardware.
PhD thesis, 2018

GliFreD: Glitch-Free Duplication Towards Power-Equalized Circuits on FPGAs.
IEEE Trans. Computers, 2018

Experiments in genetic divergence for emergent systems.
Proceedings of the 4th International Genetic Improvement Workshop, 2018

2017
A fair and comprehensive large-scale analysis of oscillation-based PUFs for FPGAs.
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017

SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

2016
On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

2015
Security analysis of index-based syndrome coding for PUF-based key generation.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads?
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

2014
A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems.
Proceedings of the 2014 International Conference on ReConFigurable Computing and FPGAs, 2014

Enabling SRAM-PUFs on Xilinx FPGAs.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

2013
Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware.
Proceedings of the Applied Cryptography and Network Security, 2013


  Loading...