scispace - formally typeset
A

Abdullah Ash Saki

Researcher at Pennsylvania State University

Publications -  16
Citations -  199

Abdullah Ash Saki is an academic researcher from Pennsylvania State University. The author has contributed to research in topics: Quantum computer & Qubit. The author has an hindex of 5, co-authored 14 publications receiving 60 citations.

Papers
More filters
Proceedings ArticleDOI

MUQUT: Multi-Constraint Quantum Circuit Mapping on NISQ Computers: Invited Paper

TL;DR: This work extends the technology mapping flows to simultaneously consider the topology and gate fidelity constraints while keeping logical depth and gate count as optimization objectives, and provides a comprehensive problem formulation and multi-tier approach towards solving it.
Journal ArticleDOI

Experimental Characterization, Modeling, and Analysis of Crosstalk in a Quantum Computer

TL;DR: Simulation of quantum circuits with experimental crosstalk error rates is enabled and it is shown that simulation considering only gate-error deviates from experimental results up to $27\%$, whereas simulation considering both gate error and crosStalk match the experiments more accurately.
Proceedings ArticleDOI

An Efficient Circuit Compilation Flow for Quantum Approximate Optimization Algorithm

TL;DR: This paper presents a compilation flow with 3 approaches to find an optimal re-ordered circuit with reduced depth and gate count and these approaches are compiler agnostic, can be integrated with existing compilers, and scalable.
Journal ArticleDOI

Quantum PUF for Security and Trust in Quantum Computing

TL;DR: In this paper, the authors proposed two flavors of a Quantum Physically Unclonable Function (QuPUF) to address the issue of temporal variations in qubit quality, which can degrade the quality of the proposed QuPUF.
Proceedings ArticleDOI

How Multi-Threshold Designs Can Protect Analog IPs

TL;DR: This paper explores the possibility of multi-threshold voltage (VTH) design to protect the analog IP from Reverse Engineering (RE)-based attacks and proposes a technique like transistor splitting to increase the effort.