Open Access
Issue
E3S Web Conf.
Volume 564, 2024
International Conference on Power Generation and Renewable Energy Sources (ICPGRES-2024)
Article Number 07011
Number of page(s) 12
Section Signal Processing
DOI https://doi.org/10.1051/e3sconf/202456407011
Published online 06 September 2024
  1. B. Ahmed, M.K. Bepary, N. Pundir, M. Borza, O. Raikhman, A. Garg, D. Donchin, A. Cron, Abdel-moneum Mama, F. Farahmandi. Quantifiable confirmation: from IPs to stages. Preprint. arXiv:220407909, (2022) [Google Scholar]
  2. M.M. Alam, M. Tehranipoor, D. Strength. Reused FPGA recognition utilizing thorough LUT way postpone portrayal. In IEEE Worldwide. Te. meet., (ITC). IEEE, Piscataway, 1-10, (2016) [Google Scholar]
  3. M. Alam, S. Chowdhury, M.M. Tehranipoor, U. Guin. Hearty, minimal expense, and precise recognition of reused ICs utilizing advanced marks. In IEEE worldwide conference on equipment arranged security and trust (HOST). IEEE, Piscataway, 209-214, (2018) [Google Scholar]
  4. A. Becher, Z. Benenson, M. Dornseif. Messing with bits: certifiable actual assaults on remote sensor organizations. In: Global gathering on security in unavoidable registering. Springer, Berlin, 104-118, (2006) [Google Scholar]
  5. S. Bhunia, M. Tehranipoor. Equipment security: an involved learning approach. Morgan Kaufmann, Burlington, (2018) [Google Scholar]
  6. J. Cruz, F. Farahmandi, A. Ahmed, P. Mishra. Equipment trojan recognition utilizing ATPG and model checking. In 31st worldwide gathering on VLSI plan and 2018 seventeenth global meeting on implanted frameworks (VLSID), 91-96, (2018) [Google Scholar]
  7. A. Duncan, F. Rahman, A. Lukefahr, F. Farahmandi, M. Tehranipoor. FPGA bitstream security: a day in the life. In IEEE Worldwide. Te. Gather., (ITC), 1-10, (2019) [Google Scholar]
  8. A. Duncan, G. Captain, A. Harsh, A. Nahiyan, F. Rahman, A. Lukefahr, M. Tehranipoor, M. Swany. Pads: filling rationale and testing spatially for FPGA verification and alter recognition. In IEEE worldwide conference on equipment arranged security and trust (HOST), 81-90, (2019) [Google Scholar]
  9. F. Farahmandi, Y. Huang, P. Mishra. Computerized test age for discovery of malignant usefulness. In Framework on-chip security. Springer, Cham, 153-171, (2020) [Google Scholar]
  10. U. Guin, D. Strong point, D. DiMase, M. Tehranipoor. Fake IC Location: Test Strategy Choice Considering Test Time, Cost, and Level Dangers, (2014) [Google Scholar]
  11. U. Guin, K. Huang, D. DiMase, J.M. Carulli, M. Tehranipoor, Y. Makris. Fake coordinated circuits: a rising danger in the worldwide semiconductor production network. Proc IEEE, 102, 8, 1207-1228, (2014) [CrossRef] [Google Scholar]
  12. Z. Guo, X. Xu, M.M. Tehranipoor, D. Strength. EOP: an encryption-jumbling answer for safeguarding PCBs against altering and figuring out. Preprint. arXiv:190409516, (2019) [Google Scholar]
  13. N.A. Hazari, M. Niamat. Improving FPGA security through trojan strong IP creation. In IEEE public aviation and hardware meeting (NAECON). IEEE, Piscataway, 362- 365, (2017) [Google Scholar]
  14. B. Khaleghi, A. Ahari, H. Asadi, S. Bayat-Sarmadi. FPGA-based insurance plot against equipment deception inclusion utilizing faker rationale. IEEE Implant Syst Lett., 7, 2, 46-50, (2015) [Google Scholar]
  15. A. Mazumder Shuvo, N. Pundir, J. Park, F. Farahmandi, M. Tehranipoor. LDTFI: design mindful timing shortcoming infusion assault evaluation against differential issue investigation. In: IEEE PC society yearly discussion on VLSI (ISVLSI), (2022) [Google Scholar]
  16. N. Miura, D. Fujimoto, D. Tanaka, H. Yi, N. Homma, T. Aoki, M. Nagata. A neighborhood EM-investigation assault safe cryptographic motor with completely computerized oscillator-based alter access sensor. In conference on VLSI circuits overview of specialized papers, (2014) [Google Scholar]
  17. N. Pundir, H. Li, L. Lin, N. Chang, F. Farahmandi, M. Tehranipoor. Security properties driven pre-silicon laser fault injection assessment. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 9-12, (2022) [Google Scholar]
  18. S. Ravi, A. Raghunathan, S. Chakradhar. Alter obstruction components for secure inserted frameworks. In Procedures of the seventeenth global gathering on VLSI plan. IEEE, Piscataway, 605-611, (2004) [Google Scholar]
  19. Q. Shi, N. Vashistha, H. Lu, H. Shen, B. Tehranipoor, D.L. Woodard, N. Asadizanjani. Brilliant doors: another crossover approach for fast equipment trojan discovery utilizing testing and imaging. In IEEE worldwide discussion on equipment arranged security and trust (HOST), 61-71, (2019) [Google Scholar]
  20. N. Vashistha, H. Lu, Q. Shi, D.L. Woodard, N. Asadizanjani, M. Tehranipoor. Recognizing equipment trojans utilizing joined self testing and imaging. IEEE Trans Comput Helped Des Integr Circuits Syst., 41, 6, 1730-1743, (2021) [Google Scholar]
  21. D. Vasile, P. Svasta. Temperature touchy dynamic alter recognition circuit. In IEEE 23rd worldwide conference for plan and innovation in electronic bundling (SIITME), 175-178, (2017) [Google Scholar]
  22. D.C. Vasile, P. Svasta. Safeguarding the insider facts: high level method for dynamic alter recognition frameworks. In IEEE 25th worldwide conference for plan and innovation in electronic bundling (SIITME), 212-215, (2019) [Google Scholar]
  23. P. Lavanya, R.I.V. Subba, V. Selvakumar, S.V. Deshpande. An Intelligent Health Surveillance System: Predictive Modeling of Cardiovascular Parameters through Machine Learning Algorithms Using LoRa Communication and Internet of Medical Things (IoMT). J. Internet Serv. Inf. Secur., 14, 1, 165-179, (2024) [Google Scholar]
  24. M.B.V. López, M.Y.A. García, J.L.B. Jaico, A.A. Ruiz-Pico, R.M. Hernández. Application of a Data Mining Model to Predict Customer Defection. Case of a Telecommunications Company in Peru. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl., 14, 1, 144-158, (2023) [Google Scholar]
  25. K. Myeongjoo. A Study on the Effect of Information and Communication Technology (ICT) on Trade in Services in the United States. J. Internet Serv. Inf. Secur., 14, 1, 266-281, (2024) [Google Scholar]
  26. Al-Sanjary, O. I., Vasuthevan, S., Omer, H. K., Mohammed, M. N., & Abdullah, M. I. (2019). An Intelligent Recycling Bin Using Wireless Sensor Network Technology. 2019 IEEE International Conference on Automatic Control and Intelligent Systems, I2CACIS 2019 - Proceedings, 30–33. https://doi.org/10.1109/I2CACIS.2019.8825044 [Google Scholar]
  27. Careem, R., Johar, G., & Khatibi, A. (2024b). Deep neural networks optimization for resource-constrained environments: techniques and models. Indonesian Journal of Electrical Engineering and Computer Science, 33(3), 1843–1854. https://doi.org/10.11591/ijeecs.v33.i3.pp1843-1854 [CrossRef] [Google Scholar]
  28. Fong, S. L., Elfaki, A. O., bin Md Johar, Md. G., & Aik, K. L. T. (2011). Mobile language translator. 2011 5th Malaysian Conference in Software Engineering, MySEC 2011, 495–500. https://doi.org/10.1109/MySEC.2011.6140723 [CrossRef] [Google Scholar]
  29. Fong, S. L., Elfaki, A. O., Johar, M. G. M., & Aik, K. L. T. (2012). Investigative study towards the development of mobile language translator. International Journal of Digital Content Technology and Its Applications, 6(22), 11–20. https://doi.org/10.4156/jdcta.vol6.issue22.2 [Google Scholar]
  30. Pragathi, B., and P. Ramu. “Authentication Technique for Safeguarding Privacy in Smart Grid Settings.” E3S Web of Conferences. Vol. 540. EDP Sciences, 2024. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.