Suivre
Syed Rafay Hasan
Titre
Citée par
Citée par
Année
Power Profiling of Microcontroller’s Instruction Set for Runtime Hardware Trojans Detection without Golden Circuit Models
FK Lodhi, SR Hasan, O Hasan, F Awwad
Design Automation Test Europe, 294 - 297, 2017
582017
A self-learning framework to detect the intruded integrated circuits
FK Lodhi, I Abbasi, F Khalid, O Hasan, F Awwad, SR Hasan
2016 IEEE International Symposium on Circuits and Systems (ISCAS), 1702-1705, 2016
482016
FPGA-based convolutional neural network architecture with reduced parameter requirements
M Hailesellasie, SR Hasan, F Khalid, FA Wad, M Shafique
2018 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2018
352018
Motion artifact reduction from PPG signals during intense exercise using filtered X-LMS
KT Tanweer, SR Hasan, AM Kamboh
2017 IEEE international symposium on circuits and systems (ISCAS), 1-4, 2017
312017
Mulnet: A flexible cnn processor with higher resource utilization efficiency for constrained devices
MT Hailesellasie, SR Hasan
IEEE Access 7, 47509-47524, 2019
292019
Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs
SR Hasan, SF Mossa, OSA Elkeelany, F Awwad
2015 IEEE 58th International Midwest Symposium on Circuits and Systems …, 2015
262015
Characterizing, modeling, and analyzing soft error propagation in asynchronous and synchronous digital circuits
GB Hamad, SR Hasan, OA Mohamed, Y Savaria
Microelectronics Reliability 55 (1), 238-250, 2015
262015
New insights into the single event transient propagation through static and TSPC logic
GB Hamad, SR Hasan, OA Mohamed, Y Savaria
IEEE Transactions on Nuclear Science 61 (4), 1618-1627, 2014
262014
Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks
H Mohammed, SR Hasan, F Awwad
IEEE Access, 2020
212020
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification
F Khalid, SR Hasan, O Hasan, F Awwad
Integration 61, 62-76, 2018
212018
Modified null convention logic pipeline to detect soft errors in both null and data phases
FK Lodhi, O Hasan, SR Hasan, F Awwad
2012 IEEE 55th International Midwest Symposium on Circuits and Systems …, 2012
212012
Survey on recent counterfeit IC detection techniques and future research directions
E Oriero, SR Hasan
Integration 66, 135-152, 2019
202019
Self-triggering hardware trojan: Due to NBTI related aging in 3-D ICs
SF Mossa, SR Hasan, O Elkeelany
Integration 58, 116-124, 2017
202017
A stealthy hardware trojan exploiting the architectural vulnerability of deep learning architectures: Input interception attack (iia)
TA Odetola, HR Mohammed, SR Hasan
arXiv preprint arXiv:1911.00783, 2019
182019
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors
SR Hasan, CA Kamhoua, KA Kwiat, L Njilla
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
182016
Hardware trojan detection in soft error tolerant macro synchronous micro asynchronous (msma) pipeline
FK Lodhi, SR Hasan, O Hasan, F Awwad
2014 IEEE 57th International Midwest Symposium on Circuits and Systems …, 2014
182014
Hardware trojans in 3-D ICs due to NBTI effects and countermeasure
SF Mossa, SR Hasan, O Elkeelany
Integration 59, 64-74, 2017
172017
Low power soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline
FK Lodhi, SR Hasan, O Hasan, F Awwad
2014 IEEE Computer Society Annual Symposium on VLSI, 601-606, 2014
172014
MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices
F Khalid, SR Hasan, S Zia, O Hasan, F Awwad, M Shafique
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
162020
Comparative analysis of magnetic materials, coil structures and shielding materials for efficient wireless power transfer
ME Bima, I Bhattacharya, SR Hasan
2019 IEEE International Symposium on Electromagnetic Compatibility, Signal …, 2019
162019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20