
Jeyavijayan "JV" Rajendran
Texas A&M University
Assistant Professor
Department of Electrical and Computer Engineering
Research Area
#Computer science#Engineering#Embedded system#Integrated circuit#Logic gate#Computer security#Hardware security module#Computer hardware#Electronic circuit#Reverse engineering
SCIE paper information
Papers relevant to ‘Computer science’: 8
Research performance of SCIE papers matching with ‘Computer science’
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Fault Analysis-Based Logic Encryption
2015/02 IEEE TRANSACTIONS ON COMPUTERS 1.723 Impact Factor 330 citations
The Cat and Mouse in Split Manufacturing
2018/01 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS 1.946 Impact Factor 69 citations
Papers for author ‘Jeyavijayan "JV" Rajendran’: 12
Number of published SCIE papers by year
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Fault Analysis-Based Logic Encryption
2015/02 IEEE TRANSACTIONS ON COMPUTERS 1.723 Impact Factor 330 citations
On Improving the Security of Logic Locking
2016/09 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1.942 Impact Factor 217 citations
conference information
Papers relevant to ‘Computer science’: 3
Research performance of Top-tier Conference matching with ‘Computer science’
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Provably-Secure Logic Locking: From Theory To Practice
2017/10 CCS Top-tier Conference 210 citations
Detecting malicious modifications of data in third-party intellectual property cores
2015/06 DAC Top-tier Conference 104 citations
Papers for author ‘Jeyavijayan "JV" Rajendran’: 5
Number of published Top-tier Conference by year
*Papers published between 2014 and 2020 were selected, and the citation number was determined by bing.com.
Provably-Secure Logic Locking: From Theory To Practice
2017/10 CCS Top-tier Conference 210 citations
Detecting malicious modifications of data in third-party intellectual property cores
2015/06 DAC Top-tier Conference 104 citations
Log in to PhD.GO
Access the Bookmarks
Add or remove professors and programs of interest from your Bookmarks
Subscribe to the graduate program newsletters that you've bookmarked
Enter your test results to ensure you meet the minimum for each graduate program at Bookmarks
At a glance, see program deadlines you've bookmarked on your calendar