Suivre
Syed Rafay Hasan
Syed Rafay Hasan
Adresse e-mail validée de tntech.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Power Profiling of Microcontroller’s Instruction Set for Runtime Hardware Trojans Detection without Golden Circuit Models
FK Lodhi, SR Hasan, O Hasan, F Awwad
Design Automation Test Europe, 294 - 297, 2017
532017
A self-learning framework to detect the intruded integrated circuits
FK Lodhi, I Abbasi, F Khalid, O Hasan, F Awwad, SR Hasan
2016 IEEE International Symposium on Circuits and Systems (ISCAS), 1702-1705, 2016
442016
FPGA-based convolutional neural network architecture with reduced parameter requirements
M Hailesellasie, SR Hasan, F Khalid, FA Wad, M Shafique
2018 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2018
322018
Mulnet: A flexible cnn processor with higher resource utilization efficiency for constrained devices
MT Hailesellasie, SR Hasan
IEEE Access 7, 47509-47524, 2019
272019
Motion artifact reduction from PPG signals during intense exercise using filtered X-LMS
KT Tanweer, SR Hasan, AM Kamboh
2017 IEEE international symposium on circuits and systems (ISCAS), 1-4, 2017
272017
Characterizing, modeling, and analyzing soft error propagation in asynchronous and synchronous digital circuits
GB Hamad, SR Hasan, OA Mohamed, Y Savaria
Microelectronics Reliability 55 (1), 238-250, 2015
272015
Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs
SR Hasan, SF Mossa, OSA Elkeelany, F Awwad
2015 IEEE 58th International Midwest Symposium on Circuits and Systems …, 2015
252015
New insights into the single event transient propagation through static and TSPC logic
GB Hamad, SR Hasan, OA Mohamed, Y Savaria
IEEE Transactions on Nuclear Science 61 (4), 1618-1627, 2014
252014
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification
F Khalid, SR Hasan, O Hasan, F Awwad
Integration 61, 62-76, 2018
202018
Survey on recent counterfeit IC detection techniques and future research directions
E Oriero, SR Hasan
Integration 66, 135-152, 2019
192019
Modified null convention logic pipeline to detect soft errors in both null and data phases
FK Lodhi, O Hasan, SR Hasan, F Awwad
2012 IEEE 55th International Midwest Symposium on Circuits and Systems …, 2012
192012
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors
SR Hasan, CA Kamhoua, KA Kwiat, L Njilla
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
182016
Hardware trojan detection in soft error tolerant macro synchronous micro asynchronous (msma) pipeline
FK Lodhi, SR Hasan, O Hasan, F Awwad
2014 IEEE 57th International Midwest Symposium on Circuits and Systems …, 2014
182014
A stealthy hardware trojan exploiting the architectural vulnerability of deep learning architectures: Input interception attack (iia)
TA Odetola, HR Mohammed, SR Hasan
arXiv preprint arXiv:1911.00783, 2019
172019
Self-triggering hardware trojan: Due to NBTI related aging in 3-D ICs
SF Mossa, SR Hasan, O Elkeelany
Integration 58, 116-124, 2017
172017
Low power soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline
FK Lodhi, SR Hasan, O Hasan, F Awwad
2014 IEEE Computer Society Annual Symposium on VLSI, 601-606, 2014
172014
Formal reliability analysis of protective systems in smart grids
A Mahmood, O Hasan, HR Gillani, Y Saleem, SR Hasan
2016 IEEE Region 10 Symposium (TENSYMP), 198-202, 2016
162016
Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks
H Mohammed, SR Hasan, F Awwad
IEEE Access, 2020
152020
Formal verification of ladder logic programs using NuSMV
S Kottler, M Khayamy, SR Hasan, O Elkeelany
SoutheastCon 2017, 1-5, 2017
152017
A library-based early soft error sensitivity analysis technique for SRAM-based FPGA design
C Thibeault, Y Hariri, SR Hasan, C Hobeika, Y Savaria, Y Audet, FZ Tazi
Journal of Electronic Testing 29, 457-471, 2013
152013
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20