Follow
Syed Rafay Hasan
Title
Cited by
Cited by
Year
Power Profiling of Microcontroller’s Instruction Set for Runtime Hardware Trojans Detection without Golden Circuit Models
FK Lodhi, SR Hasan, O Hasan, F Awwad
Design Automation Test Europe, 294 - 297, 2017
612017
A self-learning framework to detect the intruded integrated circuits
FK Lodhi, I Abbasi, F Khalid, O Hasan, F Awwad, SR Hasan
2016 IEEE International Symposium on Circuits and Systems (ISCAS), 1702-1705, 2016
522016
Motion artifact reduction from PPG signals during intense exercise using filtered X-LMS
KT Tanweer, SR Hasan, AM Kamboh
2017 IEEE international symposium on circuits and systems (ISCAS), 1-4, 2017
362017
FPGA-based convolutional neural network architecture with reduced parameter requirements
M Hailesellasie, SR Hasan, F Khalid, FA Wad, M Shafique
2018 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2018
352018
Mulnet: A flexible cnn processor with higher resource utilization efficiency for constrained devices
MT Hailesellasie, SR Hasan
IEEE Access 7, 47509-47524, 2019
312019
Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs
SR Hasan, SF Mossa, OSA Elkeelany, F Awwad
2015 IEEE 58th International Midwest Symposium on Circuits and Systems …, 2015
272015
New insights into the single event transient propagation through static and TSPC logic
GB Hamad, SR Hasan, OA Mohamed, Y Savaria
IEEE Transactions on Nuclear Science 61 (4), 1618-1627, 2014
272014
Characterizing, modeling, and analyzing soft error propagation in asynchronous and synchronous digital circuits
GB Hamad, SR Hasan, OA Mohamed, Y Savaria
Microelectronics Reliability 55 (1), 238-250, 2015
262015
Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks
H Mohammed, SR Hasan, F Awwad
IEEE Access, 2020
222020
Survey on recent counterfeit IC detection techniques and future research directions
E Oriero, SR Hasan
Integration 66, 135-152, 2019
222019
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification
F Khalid, SR Hasan, O Hasan, F Awwad
Integration 61, 62-76, 2018
222018
Modified null convention logic pipeline to detect soft errors in both null and data phases
FK Lodhi, O Hasan, SR Hasan, F Awwad
2012 IEEE 55th International Midwest Symposium on Circuits and Systems …, 2012
222012
A stealthy hardware trojan exploiting the architectural vulnerability of deep learning architectures: Input interception attack (iia)
TA Odetola, HR Mohammed, SR Hasan
arXiv preprint arXiv:1911.00783, 2019
202019
Self-triggering hardware trojan: Due to NBTI related aging in 3-D ICs
SF Mossa, SR Hasan, O Elkeelany
Integration 58, 116-124, 2017
202017
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors
SR Hasan, CA Kamhoua, KA Kwiat, L Njilla
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
202016
Hardware trojans in 3-D ICs due to NBTI effects and countermeasure
SF Mossa, SR Hasan, O Elkeelany
Integration 59, 64-74, 2017
192017
Formal verification of ladder logic programs using NuSMV
S Kottler, M Khayamy, SR Hasan, O Elkeelany
SoutheastCon 2017, 1-5, 2017
192017
Formal reliability analysis of protective systems in smart grids
A Mahmood, O Hasan, HR Gillani, Y Saleem, SR Hasan
2016 IEEE Region 10 Symposium (TENSYMP), 198-202, 2016
192016
Hardware trojan detection in soft error tolerant macro synchronous micro asynchronous (msma) pipeline
FK Lodhi, SR Hasan, O Hasan, F Awwad
2014 IEEE 57th International Midwest Symposium on Circuits and Systems …, 2014
192014
Comparative analysis of magnetic materials, coil structures and shielding materials for efficient wireless power transfer
ME Bima, I Bhattacharya, SR Hasan
2019 IEEE International Symposium on Electromagnetic Compatibility, Signal …, 2019
182019
The system can't perform the operation now. Try again later.
Articles 1–20