Exploring low cost optimal watermark for reusable IP cores during high level synthesis A Sengupta, S Bhadauria IEEE Access 4, 2198-2215, 2016 | 72 | 2016 |
TL-HLS: methodology for low cost hardware Trojan security aware scheduling with optimal loop unrolling factor during high level synthesis A Sengupta, S Bhadauria, SP Mohanty IEEE Transactions on computer-aided design of integrated circuits and …, 2016 | 69 | 2016 |
Embedding low cost optimal watermark during high level synthesis for reusable IP core protection A Sengupta, S Bhadauria, SP Mohanty 2016 IEEE International Symposium on Circuits and Systems (ISCAS), 974-977, 2016 | 26 | 2016 |
Untrusted third party digital ip cores: Power-delay trade-off driven exploration of hardware trojan secured datapath during high level synthesis A Sengupta, S Bhadauria Proceedings of the 25th edition on Great Lakes Symposium on VLSI, 167-172, 2015 | 26 | 2015 |
Bacterial foraging driven exploration of multi cycle fault tolerant datapath based on power-performance tradeoff in high level synthesis A Sengupta, S Bhadauria Expert Systems with Applications 42 (10), 4719-4732, 2015 | 18 | 2015 |
Automated exploration of datapath in high level synthesis using temperature dependent bacterial foraging optimization algorithm A Sengupta, S Bhadauria 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering …, 2014 | 18 | 2014 |
Demand prediction for e-commerce advertisements: A comparative study using state-of-the-art machine learning methods S Rai, A Gupta, A Anand, A Trivedi, S Bhadauria 2019 10th international conference on computing, communication and …, 2019 | 15 | 2019 |
Adaptive bacterial foraging driven datapath optimization: Exploring power-performance tradeoff in high level synthesis S Bhadauria, A Sengupta Applied Mathematics and Computation 269, 265-278, 2015 | 15 | 2015 |
A cost aware topology formation scheme for latency sensitive applications in edge infrastructure-as-a-service paradigm H Gauttam, KK Pattanaik, S Bhadauria, D Saxena Journal of Network and Computer Applications 199, 103303, 2022 | 14 | 2022 |
Exploration of multi-objective tradeoff during high level synthesis using bacterial chemotaxis and dispersal A Sengupta, S Bhadauria Procedia Computer Science 35, 63-72, 2014 | 14 | 2014 |
An efficient DNN splitting scheme for edge-AI enabled smart manufacturing H Gauttam, KK Pattanaik, S Bhadauria, G Nain, PB Prakash Journal of Industrial Information Integration 34, 100481, 2023 | 10 | 2023 |
User power-delay budget driven PSO based design space exploration of optimal k-cycle transient fault secured datapath during high level synthesis A Sengupta, S Bhadauria Sixteenth International Symposium on Quality Electronic Design, 289-292, 2015 | 10 | 2015 |
Low‐cost security aware HLS methodology A Sengupta, S Bhadauria, SP Mohanty IET Computers & Digital Techniques 11 (2), 68-79, 2017 | 8 | 2017 |
Watermarking of deep recurrent neural network using adversarial examples to protect intellectual property P Rathi, S Bhadauria, S Rathi Applied Artificial Intelligence 36 (1), 2008613, 2022 | 7 | 2022 |
Application of cryptocurrencies using Blockchain for e-commerce online payment K Adewole, N Saxena, S Bhadauria Blockchain for Cybersecurity and Privacy, 263-305, 2020 | 6 | 2020 |
Hybrid Intrusion Detection System using an Unsupervised method for Anomaly-based Detection S Bhadauria, T Mohanty 2021 IEEE International Conference on Advanced Networks and …, 2021 | 5 | 2021 |
IP core protection of CDFGs using robust watermarking during behavioral synthesis based on user resource constraint and loop unrolling factor A Sengupta, S Bhadauria IET Electronics Letters 52 (6), 439-441, 2016 | 5 | 2016 |
Automated design space exploration of multi-cycle transient fault detectable datapath based on multi-objective user constraints for application specific computing A Sengupta, S Bhadauria Advances in Engineering Software 82, 14-24, 2015 | 5 | 2015 |
Hybrid Beamforming Channel Estimation With Reduced Phase shifter numbers for Massive MIMO Systems PK Tyagi, A Trivedi, S Bhadauria 2019 International Conference on Electrical, Electronics and Computer …, 2019 | 4 | 2019 |
Cookie based protocol to defend malicious browser extensions J Joseph, S Bhadauria 2019 International Carnahan Conference on Security Technology (ICCST), 1-6, 2019 | 4 | 2019 |