关注
Qutaiba Alasad
Qutaiba Alasad
Associate Professor at Cybersecurity Department / Tikrit University
在 tu.edu.iq 的电子邮件经过验证
标题
引用次数
引用次数
年份
Ultra-low-power design and hardware security using emerging technologies for Internet of Things
JS Yuan, J Lin, Q Alasad, S Taheri
Electronics 6 (3), 67, 2017
362017
Leveraging all-spin logic to improve hardware security
Q Alasad, J Yuan, D Fan
Proceedings of the on Great Lakes Symposium on VLSI 2017, 491-494, 2017
312017
Logic locking using hybrid CMOS and emerging SiNW FETs
Q Alasad, JS Yuan, Y Bi
Electronics 6 (3), 69, 2017
292017
E2LEMI:Energy-Efficient Logic Encryption Using Multiplexer Insertion
Q Alasad, Y Bi, JS Yuan
Electronics 6 (1), 16, 2017
262017
Logic obfuscation against IC reverse engineering attacks using PLGs
Q Alasad, J Yuan
2017 IEEE International Conference on Computer Design (ICCD), 341-344, 2017
182017
Strong logic obfuscation with low overhead against IC reverse engineering attacks
Q Alasad, JS Yuan, P Subramanyan
ACM Transactions on Design Automation of Electronic Systems (TODAES) 25 (4 …, 2020
162020
Resilient AES against side-channel attack using all-spin logic
Q Alasad, J Yuan, J Lin
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 57-62, 2018
142018
Mitigation of black-box attacks on intrusion detection systems-based ml
S Alahmed, Q Alasad, MM Hammood, JS Yuan, M Alawad
Computers 11 (7), 115, 2022
132022
Resilient and secure hardware devices using ASL
Q Alasad, J Lin, JS Yuan, D Fan, A Awad
ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (2), 1-26, 2021
122021
Towards adversarial attacks for clinical document classification
N Fatehi, Q Alasad, M Alawad
Electronics 12 (1), 129, 2022
72022
Performance and Complexity Tradeoffs of Feature Selection on Intrusion Detection System-Based Neural Network Classification with High-Dimensional Dataset
Q Alasad, MM Hammood, S Alahmed
International Conference on Emerging Technologies and Intelligent Systems …, 2022
22022
Multi-tier 3D IC physical design with analytical quadratic partitioning algorithm using 2D P&R tool
A Tamir, M Salem, J Lin, Q Alasad, J Yuan
Electronics 10 (16), 1930, 2021
12021
Impacting Robustness in Deep Learning-Based NIDS through Poisoning Attacks
S Alahmed, Q Alasad, JS Yuan, M Alawad
Algorithms 17 (4), 155, 2024
2024
Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML. Computers 2022, 11, 115
S Alahmed, Q Alasad, MM Hammood, JS Yuan, M Alawad
s Note: MDPI stays neutral with regard to jurisdictional claims in published …, 2022
2022
Provably Trustworthy and Secure Hardware Design with Low Overhead
Q Alasad
2020
系统目前无法执行此操作,请稍后再试。
文章 1–15