641 results on '"Homayoun, Houman"'
Search Results
152. On Designing Secure and Robust Scan Chain for Protecting Obfuscated Logic
153. Recent Advancements in Microarchitectural Security: Review of Machine Learning Countermeasures
154. SCARF: Detecting Side-Channel Attacks at Real-time using Low-level Hardware Features
155. SCRAMBLE: The State, Connectivity and Routing Augmentation Model for Building Logic Encryption
156. DFSSD: Deep Faults and Shallow State Duality, A Provably Strong Obfuscation Solution for Circuits with Restricted Access to Scan Chain
157. SAT-Hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain
158. CSCMAC - Cyclic Sparsely Connected Neural Network Manycore Accelerator
159. Entropy-Shield:Side-Channel Entropy Maximization for Timing-based Side-Channel Attacks
160. Mitigating Cache-Based Side-Channel Attacks through Randomization: A Comprehensive System and Architecture Level Analysis
161. LASCA: Learning Assisted Side Channel Delay Analysis for Hardware Trojan Detection
162. Estimating the Circuit De-obfuscation Runtime based on Graph Deep Learning
163. SATConda: SAT to SAT-Hard Clause Translator
164. Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks
165. Cognitive and Scalable Technique for Securing IoT Networks Against Malware Epidemics
166. NESTA: Hamming Weight Compression-Based Neural Proc. EngineAli Mirzaeian
167. A+ Tuning: Architecture+Application Auto-Tuning for In-Memory Data-Processing Frameworks
168. TCD-NPE: A Re-configurable and Efficient Neural Processing Engine, Powered by Novel Temporal-Carry-deferring MACs
169. ICNN
170. DynGraph2Seq: Dynamic-Graph-to-Sequence Interpretable Learning for Health Stage Prediction in Online Health Forums
171. Deep Multi-attributed Graph Translation with Node-Edge Co-Evolution
172. Security and Complexity Analysis of LUT-based Obfuscation: From Blueprint to Reality
173. Sequence-crafter
174. SAT to SAT-hard clause translator
175. Application and Thermal-reliability-aware Reinforcement Learning Based Multi-core Power Management
176. Differential representation of Pavlovian–instrumental transfer by prefrontal cortex subregions and striatum
177. The synergistic anticonvulsant effect of agmatine and morphine: Possible role of alpha 2-adrenoceptors
178. The proconvulsant effect of sildenafil in mice: role of nitric oxide-cGMP pathway
179. Bursting of Prefrontal Cortex Neurons in Awake Rats is Regulated by Metabotropic Glutamate 5 (mGlu5) Receptors: Rate-dependent Influence and Interaction with NMDA Receptors
180. The interaction of cannabinoids and opioids on pentylenetetrazole-induced seizure threshold in mice
181. Sex and Estrus Cycle Differences in the Modulatory Effects of Morphine on Seizure Susceptibility in Mice
182. Differential contribution of cholecystokinin receptors to stress-induced modulation of seizure and nociception thresholds in mice
183. Intestinal inflammation alters the susceptibility to pentylenetetrazole-induced seizure in mice
184. Agmatine exerts anticonvulsant effect in mice: modulation by α2-adrenoceptors and nitric oxide
185. Inhibition by immunophilin ligands of morphine-induced tolerance and dependence in guinea pig ileum
186. Mediation of nitric oxide in inhibitory effect of morphine against electroshock-induced convulsions in mice
187. Accelerating discovery of tunable optical materials (ATOM)
188. Do endogenous opioids contribute to the bradycardia of rats with obstructive cholestasis?
189. The Role of α2-Adrenoceptors in the Modulatory Effects of Morphine on Seizure Susceptibility in Mice
190. The additive effect of opioids and nitric oxide in increasing pentylenetetrazole-induced seizure threshold in cholestatic mice
191. Agmatine exerts anticonvulsant effect in mice: modulation by α 2-adrenoceptors and nitric oxide
192. Deep graph transformation for attributed, directed, and signed networks.
193. Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design
194. ECoST
195. On the Complexity Reduction of Dense Layers from O(N2) to O(NlogN) with Cyclic Sparsely Connected Layers
196. Adversarial Attack on Microarchitectural Events based Malware Detectors
197. Full-Lock
198. On Custom LUT-based Obfuscation
199. Mitigating the Performance and Quality of Parallelized Compressive Sensing Reconstruction Using Image Stitching
200. Threats on Logic Locking
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.