Följ
Syed Rafay Hasan
Titel
Citeras av
Citeras av
År
Power Profiling of Microcontroller’s Instruction Set for Runtime Hardware Trojans Detection without Golden Circuit Models
FK Lodhi, SR Hasan, O Hasan, F Awwad
Design Automation Test Europe, 294 - 297, 2017
682017
A self-learning framework to detect the intruded integrated circuits
FK Lodhi, I Abbasi, F Khalid, O Hasan, F Awwad, SR Hasan
2016 IEEE International Symposium on Circuits and Systems (ISCAS), 1702-1705, 2016
532016
Motion artifact reduction from PPG signals during intense exercise using filtered X-LMS
KT Tanweer, SR Hasan, AM Kamboh
2017 IEEE international symposium on circuits and systems (ISCAS), 1-4, 2017
482017
FPGA-based convolutional neural network architecture with reduced parameter requirements
M Hailesellasie, SR Hasan, F Khalid, FA Wad, M Shafique
2018 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2018
412018
Mulnet: A flexible cnn processor with higher resource utilization efficiency for constrained devices
MT Hailesellasie, SR Hasan
IEEE Access 7, 47509-47524, 2019
322019
Survey on recent counterfeit IC detection techniques and future research directions
E Oriero, SR Hasan
Integration 66, 135-152, 2019
312019
Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs
SR Hasan, SF Mossa, OSA Elkeelany, F Awwad
2015 IEEE 58th International Midwest Symposium on Circuits and Systems …, 2015
312015
New insights into the single event transient propagation through static and TSPC logic
GB Hamad, SR Hasan, OA Mohamed, Y Savaria
IEEE Transactions on Nuclear Science 61 (4), 1618-1627, 2014
302014
Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks
H Mohammed, SR Hasan, F Awwad
IEEE Access, 2020
282020
Characterizing, modeling, and analyzing soft error propagation in asynchronous and synchronous digital circuits
GB Hamad, SR Hasan, OA Mohamed, Y Savaria
Microelectronics Reliability 55 (1), 238-250, 2015
272015
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification
F Khalid, SR Hasan, O Hasan, F Awwad
Integration 61, 62-76, 2018
242018
Formal verification of ladder logic programs using NuSMV
S Kottler, M Khayamy, SR Hasan, O Elkeelany
SoutheastCon 2017, 1-5, 2017
222017
Modified null convention logic pipeline to detect soft errors in both null and data phases
FK Lodhi, O Hasan, SR Hasan, F Awwad
2012 IEEE 55th International Midwest Symposium on Circuits and Systems …, 2012
222012
A stealthy hardware trojan exploiting the architectural vulnerability of deep learning architectures: Input interception attack (iia)
TA Odetola, HR Mohammed, SR Hasan
arXiv preprint arXiv:1911.00783, 2019
212019
(HIADIoT): Hardware intrinsic attack detection in Internet of Things; leveraging power profiling
H Mohammed, TA Odetola, SR Hasan, S Stissi, I Garlin, F Awwad
2019 ieee 62nd international midwest symposium on circuits and systems …, 2019
212019
Self-triggering hardware trojan: Due to NBTI related aging in 3-D ICs
SF Mossa, SR Hasan, O Elkeelany
Integration 58, 116-124, 2017
212017
Hardware trojans in 3-D ICs due to NBTI effects and countermeasure
SF Mossa, SR Hasan, O Elkeelany
Integration 59, 64-74, 2017
202017
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors
SR Hasan, CA Kamhoua, KA Kwiat, L Njilla
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
202016
Formal reliability analysis of protective systems in smart grids
A Mahmood, O Hasan, HR Gillani, Y Saleem, SR Hasan
2016 IEEE Region 10 Symposium (TENSYMP), 198-202, 2016
202016
MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT edge devices
F Khalid, SR Hasan, S Zia, O Hasan, F Awwad, M Shafique
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
192020
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20