ECG arrhythmia classification using transfer learning from 2-dimensional deep CNN features M Salem, S Taheri, JS Yuan 2018 IEEE biomedical circuits and systems conference (BioCAS), 1-4, 2018 | 178 | 2018 |
Anomaly generation using generative adversarial networks in host based intrusion detection M Salem, S Taheri, JS Yuan IEEE Annual Ubiquitous Computing, Electronics, and Mobile Communications …, 2018 | 62 | 2018 |
Utilizing Transfer Learning and Homomorphic Encryption in a Privacy Preserving and Secure Biometric Recognition System M Salem, S Taheri, J Shiun-Yuan Computers 8 (3), 2018 | 40 | 2018 |
Leveraging Image Representation of Network Traffic Data and Transfer Learning in Botnet Detection S Taheri, M Salem, JS Yuan Big Data and Cognitive Computing (2), 37, 2018 | 40 | 2018 |
Ultra-low-power design and hardware security using emerging technologies for Internet of Things JS Yuan, J Lin, Q Alasad, S Taheri Electronics 6 (3), 67, 2017 | 36 | 2017 |
Why is deep learning challenging for printed circuit board (pcb) component recognition and how can we address it? MA Mallaiyan Sathiaseelan, OP Paradis, S Taheri, N Asadizanjani Cryptography 5 (1), 9, 2021 | 35 | 2021 |
An experimental evaluation of fault diagnosis from imbalanced and incomplete data for smart semiconductor manufacturing M Salem, S Taheri, JS Yuan Big Data and Cognitive Computing 2 (4), 30, 2018 | 26 | 2018 |
PCB Component Detection using Computer Vision for Hardware Assurance W Zhao, S Gurudu, S Taheri, S Ghosh, MA Mallaiyan Sathiaseelan, ... Big Data and Cognitive Computing 6 (https://www.mdpi.com/2504-2289/6/2/39), 39, 2022 | 20 | 2022 |
A cross-layer biometric recognition system for mobile IoT devices S Taheri, JS Yuan Electronics 7 (2), 26, 2018 | 19 | 2018 |
Security interrogation and defense for SAR analog to digital converter S Taheri, J Lin, JS Yuan Electronics 6 (2), 48, 2017 | 14 | 2017 |
Developing a Robust Defensive System against Adversarial Examples Using Generative Adversarial Networks S Taheri, A Khormali, M Salem, JS Yuan Big Data Cogn. Comput. 2020, 4, 11, 2020 | 10 | 2020 |
Security Analysis of Tunnel Field-Effect Transistor for Low Power Hardware S Taheri, JS Yuan International Journal of Computer Science and Information Technologies …, 2017 | 8 | 2017 |
RazorNet: Adversarial training and noise training on a deep neural network fooled by a shallow neural network S Taheri, M Salem, JS Yuan Big Data and Cognitive Computing 3 (3), 43, 2019 | 7 | 2019 |
Logo Classification and Data Augmentation Techniques for PCB Assurance and Counterfeit Detection M Azhagan Mallaiyan Sathiaseelan, O P. Paradis, R Rai, ... Conference Proceedings from the 47th International Symposium for Testing and …, 2021 | 6* | 2021 |
Generative Adversarial Network for Integrated Circuits Physical Assurance Using Scanning Electron Microscopy MM Al Hasan, N Vashistha, S Taheri, M Tehranipoor IEEE International Symposium on the Physical and Failure Analysis of …, 2021 | 5 | 2021 |
Mixed-Signal Hardware Security: Attacks and Countermeasures for ΔΣ ADC S Taheri, JS Yuan Electronics 6 (3), 60, 2017 | 5 | 2017 |
EVHA: Explainable Vision System for Hardware Testing and Assurance--An Overview M Mahfuz Al Hasan, M Tahsin Mostafiz, TA Le, J Julia, N Vashistha, ... arXiv e-prints, arXiv: 2207.09627, 2022 | 4* | 2022 |
PCB Component Detection for Hardware Assurance: A Feature Selection-based Approach S Ghosh, M Tahsin Mostafiz, S Reddy Gurudu, S Taheri, N Asadizanjani IEEE International Symposium on Hardware Oriented Security and Trust (HOST …, 2022 | 3 | 2022 |
An Overview of Medical Electronic Hardware Security and Emerging Solutions S Taheri, N Asadizanjani Electronics 11 (https://www.mdpi.com/2079-9292/11/4/610), 610, 2022 | 3 | 2022 |
IC SynthLogo: A Synthetic Logo Image Dataset for Counterfeit and Recycled IC detection MAM Sathiaseelan, MY Vutukuru, SV Pandurangi, S Taheri, ... 2021 IEEE International Symposium on the Physical and Failure Analysis of …, 2021 | 3 | 2021 |