关注
Saumya Bhadauria
Saumya Bhadauria
在 iiitm.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Exploring low cost optimal watermark for reusable IP cores during high level synthesis
A Sengupta, S Bhadauria
IEEE Access 4, 2198-2215, 2016
722016
TL-HLS: methodology for low cost hardware Trojan security aware scheduling with optimal loop unrolling factor during high level synthesis
A Sengupta, S Bhadauria, SP Mohanty
IEEE Transactions on computer-aided design of integrated circuits and …, 2016
692016
Embedding low cost optimal watermark during high level synthesis for reusable IP core protection
A Sengupta, S Bhadauria, SP Mohanty
2016 IEEE International Symposium on Circuits and Systems (ISCAS), 974-977, 2016
262016
Untrusted third party digital ip cores: Power-delay trade-off driven exploration of hardware trojan secured datapath during high level synthesis
A Sengupta, S Bhadauria
Proceedings of the 25th edition on Great Lakes Symposium on VLSI, 167-172, 2015
262015
Bacterial foraging driven exploration of multi cycle fault tolerant datapath based on power-performance tradeoff in high level synthesis
A Sengupta, S Bhadauria
Expert Systems with Applications 42 (10), 4719-4732, 2015
182015
Automated exploration of datapath in high level synthesis using temperature dependent bacterial foraging optimization algorithm
A Sengupta, S Bhadauria
2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering …, 2014
182014
Demand prediction for e-commerce advertisements: A comparative study using state-of-the-art machine learning methods
S Rai, A Gupta, A Anand, A Trivedi, S Bhadauria
2019 10th international conference on computing, communication and …, 2019
152019
Adaptive bacterial foraging driven datapath optimization: Exploring power-performance tradeoff in high level synthesis
S Bhadauria, A Sengupta
Applied Mathematics and Computation 269, 265-278, 2015
152015
A cost aware topology formation scheme for latency sensitive applications in edge infrastructure-as-a-service paradigm
H Gauttam, KK Pattanaik, S Bhadauria, D Saxena
Journal of Network and Computer Applications 199, 103303, 2022
142022
Exploration of multi-objective tradeoff during high level synthesis using bacterial chemotaxis and dispersal
A Sengupta, S Bhadauria
Procedia Computer Science 35, 63-72, 2014
142014
An efficient DNN splitting scheme for edge-AI enabled smart manufacturing
H Gauttam, KK Pattanaik, S Bhadauria, G Nain, PB Prakash
Journal of Industrial Information Integration 34, 100481, 2023
102023
User power-delay budget driven PSO based design space exploration of optimal k-cycle transient fault secured datapath during high level synthesis
A Sengupta, S Bhadauria
Sixteenth International Symposium on Quality Electronic Design, 289-292, 2015
102015
Low‐cost security aware HLS methodology
A Sengupta, S Bhadauria, SP Mohanty
IET Computers & Digital Techniques 11 (2), 68-79, 2017
82017
Watermarking of deep recurrent neural network using adversarial examples to protect intellectual property
P Rathi, S Bhadauria, S Rathi
Applied Artificial Intelligence 36 (1), 2008613, 2022
72022
Application of cryptocurrencies using Blockchain for e-commerce online payment
K Adewole, N Saxena, S Bhadauria
Blockchain for Cybersecurity and Privacy, 263-305, 2020
62020
Hybrid Intrusion Detection System using an Unsupervised method for Anomaly-based Detection
S Bhadauria, T Mohanty
2021 IEEE International Conference on Advanced Networks and …, 2021
52021
IP core protection of CDFGs using robust watermarking during behavioral synthesis based on user resource constraint and loop unrolling factor
A Sengupta, S Bhadauria
IET Electronics Letters 52 (6), 439-441, 2016
52016
Automated design space exploration of multi-cycle transient fault detectable datapath based on multi-objective user constraints for application specific computing
A Sengupta, S Bhadauria
Advances in Engineering Software 82, 14-24, 2015
52015
Hybrid Beamforming Channel Estimation With Reduced Phase shifter numbers for Massive MIMO Systems
PK Tyagi, A Trivedi, S Bhadauria
2019 International Conference on Electrical, Electronics and Computer …, 2019
42019
Cookie based protocol to defend malicious browser extensions
J Joseph, S Bhadauria
2019 International Carnahan Conference on Security Technology (ICCST), 1-6, 2019
42019
系统目前无法执行此操作,请稍后再试。
文章 1–20