PMTP: A MAX-SAT-based approach to detect hardware trojan using propagation of maximum transition probability A Shabani, B Alizadeh IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018 | 25 | 2018 |
SAT-based integrated hardware trojan detection and localization approach through path-delay analysis M Sabri, A Shabani, B Alizadeh IEEE Transactions on Circuits and Systems II: Express Briefs 68 (8), 2850-2854, 2021 | 20 | 2021 |
Low-power DCT-based compressor for wireless capsule endoscopy A Shabani, S Timarchi Signal Processing: Image Communication 59, 83-95, 2017 | 20 | 2017 |
Enhancing hardware trojan detection sensitivity using partition-based shuffling scheme A Shabani, B Alizadeh IEEE Transactions on Circuits and Systems II: Express Briefs 68 (1), 266-270, 2020 | 15 | 2020 |
A comparative study of machine learning classifiers for secure RF-PUF-based authentication in internet of things A Ashtari, B Alizadeh Microprocessors and Microsystems 93, 104600, 2022 | 12 | 2022 |
A new RF-PUF based authentication of internet of things using random forest classification A Ashtari, A Shabani, B Alizadeh 2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019 | 10 | 2019 |
Power and area efficient CORDIC-Based DCT using direct realization of decomposed matrix A Shabani, S Timarchi, H Mahdavi Microelectronics Journal 91, 11-21, 2019 | 9 | 2019 |
Area and power-efficient variable-sized DCT architecture for HEVC using Muxed-MCM problem A Shabani, M Sabri, B Khabbazan, S Timarchi IEEE Transactions on Circuits and Systems I: Regular Papers 68 (3), 1259-1268, 2020 | 8 | 2020 |
PODEM: A low-cost property-based design modification for detecting hardware trojans in resource-constraint IoT devices A Shabani, B Alizadeh Journal of Network and Computer Applications 167, 102713, 2020 | 8 | 2020 |
DC-PUF: machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices A Sajadi, A Shabani, B Alizadeh Journal of Network and Computer Applications 217, 103693, 2023 | 7 | 2023 |
Hardware patching methodology for neutralizing timing hardware Trojans using vulnerability analysis and time borrowing scheme F Khormizi, A Shabani, B Alizadeh IEEE Transactions on Circuits and Systems II: Express Briefs 69 (6), 2937-2941, 2022 | 4 | 2022 |
Low power parallel prefix adder design using two phase adiabatic logic A Hassanzadeh, A Shabani J. Electr. Electron. Eng 3 (6), 181, 2015 | 3 | 2015 |
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices. A Ashtari, A Shabani, B Alizadeh ISeCure 14 (3), 2022 | | 2022 |
Optimum mode operation of Piezoelectric material for energy harvesting applications A Shabani, A Hassanzadeh The 6th Power Electronics, Drive Systems & Technologies Conference …, 2015 | | 2015 |
ISCISC 2019 Papers BMI Watermarking, S Sheidani, Z Eslami, FS Babamir, M Kirci, MM Modiri, ... | | |