Power Profiling of Microcontroller’s Instruction Set for Runtime Hardware Trojans Detection without Golden Circuit Models FK Lodhi, SR Hasan, O Hasan, F Awwad Design Automation Test Europe, 294 - 297, 2017 | 63 | 2017 |
A self-learning framework to detect the intruded integrated circuits FK Lodhi, I Abbasi, F Khalid, O Hasan, F Awwad, SR Hasan 2016 IEEE International Symposium on Circuits and Systems (ISCAS), 1702-1705, 2016 | 53 | 2016 |
Motion artifact reduction from PPG signals during intense exercise using filtered X-LMS KT Tanweer, SR Hasan, AM Kamboh 2017 IEEE international symposium on circuits and systems (ISCAS), 1-4, 2017 | 39 | 2017 |
FPGA-based convolutional neural network architecture with reduced parameter requirements M Hailesellasie, SR Hasan, F Khalid, FA Wad, M Shafique 2018 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2018 | 37 | 2018 |
Mulnet: A flexible cnn processor with higher resource utilization efficiency for constrained devices MT Hailesellasie, SR Hasan IEEE Access 7, 47509-47524, 2019 | 31 | 2019 |
Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs SR Hasan, SF Mossa, OSA Elkeelany, F Awwad 2015 IEEE 58th International Midwest Symposium on Circuits and Systems …, 2015 | 28 | 2015 |
New insights into the single event transient propagation through static and TSPC logic GB Hamad, SR Hasan, OA Mohamed, Y Savaria IEEE Transactions on Nuclear Science 61 (4), 1618-1627, 2014 | 28 | 2014 |
Characterizing, modeling, and analyzing soft error propagation in asynchronous and synchronous digital circuits GB Hamad, SR Hasan, OA Mohamed, Y Savaria Microelectronics Reliability 55 (1), 238-250, 2015 | 26 | 2015 |
Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks H Mohammed, SR Hasan, F Awwad IEEE Access, 2020 | 25 | 2020 |
Survey on recent counterfeit IC detection techniques and future research directions E Oriero, SR Hasan Integration 66, 135-152, 2019 | 24 | 2019 |
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification F Khalid, SR Hasan, O Hasan, F Awwad Integration 61, 62-76, 2018 | 23 | 2018 |
Modified null convention logic pipeline to detect soft errors in both null and data phases FK Lodhi, O Hasan, SR Hasan, F Awwad 2012 IEEE 55th International Midwest Symposium on Circuits and Systems …, 2012 | 22 | 2012 |
Self-triggering hardware trojan: Due to NBTI related aging in 3-D ICs SF Mossa, SR Hasan, O Elkeelany Integration 58, 116-124, 2017 | 21 | 2017 |
A stealthy hardware trojan exploiting the architectural vulnerability of deep learning architectures: Input interception attack (iia) TA Odetola, HR Mohammed, SR Hasan arXiv preprint arXiv:1911.00783, 2019 | 20 | 2019 |
Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors SR Hasan, CA Kamhoua, KA Kwiat, L Njilla 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016 | 20 | 2016 |
Hardware trojans in 3-D ICs due to NBTI effects and countermeasure SF Mossa, SR Hasan, O Elkeelany Integration 59, 64-74, 2017 | 19 | 2017 |
Formal verification of ladder logic programs using NuSMV S Kottler, M Khayamy, SR Hasan, O Elkeelany SoutheastCon 2017, 1-5, 2017 | 19 | 2017 |
Formal reliability analysis of protective systems in smart grids A Mahmood, O Hasan, HR Gillani, Y Saleem, SR Hasan 2016 IEEE Region 10 Symposium (TENSYMP), 198-202, 2016 | 19 | 2016 |
Hardware trojan detection in soft error tolerant macro synchronous micro asynchronous (msma) pipeline FK Lodhi, SR Hasan, O Hasan, F Awwad 2014 IEEE 57th International Midwest Symposium on Circuits and Systems …, 2014 | 19 | 2014 |
Comparative analysis of magnetic materials, coil structures and shielding materials for efficient wireless power transfer ME Bima, I Bhattacharya, SR Hasan 2019 IEEE International Symposium on Electromagnetic Compatibility, Signal …, 2019 | 18 | 2019 |