A novel low complexity logic encryption technique for design-for-trust VS Rathor, B Garg, GK Sharma IEEE Transactions on emerging topics in Computing 8 (3), 688-699, 2018 | 20 | 2018 |
An efficient virtual machine scheduling technique in cloud computing environment VS Rathor, RK Pateriya, RK Gupta International Journal Modern Education and Computer Science 7 (3), 39-46, 2015 | 19 | 2015 |
A new hardware Trojan detection technique using deep convolutional neural network R Sharma, VS Rathor, GK Sharma, M Pattanaik Integration 79, 1-11, 2021 | 12 | 2021 |
New lightweight Anti-SAT block design and obfuscation technique to thwart removal attack VS Rathor, B Garg, GK Sharma Integration 75, 178-188, 2020 | 10 | 2020 |
An Energy-Efficient Trusted FSM Design Technique to Thwart Fault Injection and Trojan Attacks VS Rathor, B Garg, GK Sharma 31st VLSI Design Conference, 2018, 2018 | 10 | 2018 |
New light weight threshold voltage defined camouflaged gates for trustworthy designs VS Rathor, B Garg, GK Sharma Journal of Electronic Testing 33 (5), 657-668, 2017 | 10 | 2017 |
Significance driven inverse distance weighted filter to restore impulsive noise corrupted x-ray image B Garg, PS Rana, VS Rathor Journal of Ambient Intelligence and Humanized Computing 13 (4), 2013-2024, 2022 | 8 | 2022 |
A lightweight robust logic locking technique to thwart sensitization and cone-based attacks VS Rathor, GK Sharma IEEE Transactions on Emerging Topics in Computing 9 (2), 811-822, 2019 | 8 | 2019 |
Survey on load balancing through virtual machine scheduling in cloud computing environment VS Rathor, RK Pateriya, RK Gupta International Journal of Cloud Computing and Services Science 3 (1), 37, 2014 | 7 | 2014 |
Multiview deep learning-based attack to break text-CAPTCHAs MO Yusuf, D Srivastava, D Singh, VS Rathor International Journal of Machine Learning and Cybernetics 14 (3), 959-972, 2023 | 6 | 2023 |
Hyperspectral image classification using multiobjective optimization S Singh, D Singh, M Sajwan, VS Rathor, D Garg Multimedia Tools and Applications 81 (18), 25345-25362, 2022 | 5 | 2022 |
New lightweight architectures for secure FSM design to thwart fault injection and Trojan attacks VS Rathor, B Garg, GK Sharma Journal of Electronic Testing 34 (6), 697-708, 2018 | 4 | 2018 |
Intelligent Analytics for Industry 4.0 Applications. eds. Avinash Chandra Pandey, Abhishek Verma, Vijaypal Singh Rathor, Munesh ... CRC Press, 2023., PP 1-312, 2023 | 3 | 2023 |
Security analysis of image CAPTCHA using a mask R-CNN-based attack model VS Rathor, B Garg, M Patil, GK Sharma International Journal of Ad Hoc and Ubiquitous Computing 36 (4), 238-247, 2021 | 3 | 2021 |
GateLock: Input-Dependent Key-based locked Gates for SAT resistant logic locking VS Rathor, M Singh, KS Sahoo, SP Mohanty IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2023 | 2 | 2023 |
Performance of Interpolation Techniques for Compression of Crop Image: A Comparative Study D Mishra, A Kumar, VS Rathor 2023 International Conference on Computer, Electronics & Electrical …, 2023 | 1 | 2023 |
SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection VS Rathor, M Singh, KS Sahoo, SP Mohanty arXiv preprint arXiv:2406.19091, 2024 | | 2024 |
Color Crop Image Compression Technique using Singular Vector Sparse Reconstruction D Mishra, A Kumar, VS Rathor, HS Pal, GK Singh 2023 IEEE 7th Conference on Information and Communication Technology (CICT), 1-5, 2023 | | 2023 |
Hybrid technique for crop image compression using discrete wavelet transform and sparse singular vector reconstruction D Mishra, A Kumar, VS Rathor, GK Singh Computers and Electronics in Agriculture 215, 108391, 2023 | | 2023 |
A New ATPG and Online Monitoring based Technique for Hardware Trojan Detection VS Rathor, GK Sharma Microprocessors and Microsystems 101, 104903, 2023 | | 2023 |