A
Abdullah Ash Saki
Researcher at Pennsylvania State University
Publications - 16
Citations - 199
Abdullah Ash Saki is an academic researcher from Pennsylvania State University. The author has contributed to research in topics: Quantum computer & Qubit. The author has an hindex of 5, co-authored 14 publications receiving 60 citations.
Papers
More filters
Proceedings ArticleDOI
MUQUT: Multi-Constraint Quantum Circuit Mapping on NISQ Computers: Invited Paper
TL;DR: This work extends the technology mapping flows to simultaneously consider the topology and gate fidelity constraints while keeping logical depth and gate count as optimization objectives, and provides a comprehensive problem formulation and multi-tier approach towards solving it.
Journal ArticleDOI
Experimental Characterization, Modeling, and Analysis of Crosstalk in a Quantum Computer
TL;DR: Simulation of quantum circuits with experimental crosstalk error rates is enabled and it is shown that simulation considering only gate-error deviates from experimental results up to $27\%$, whereas simulation considering both gate error and crosStalk match the experiments more accurately.
Proceedings ArticleDOI
An Efficient Circuit Compilation Flow for Quantum Approximate Optimization Algorithm
TL;DR: This paper presents a compilation flow with 3 approaches to find an optimal re-ordered circuit with reduced depth and gate count and these approaches are compiler agnostic, can be integrated with existing compilers, and scalable.
Journal ArticleDOI
Quantum PUF for Security and Trust in Quantum Computing
TL;DR: In this paper, the authors proposed two flavors of a Quantum Physically Unclonable Function (QuPUF) to address the issue of temporal variations in qubit quality, which can degrade the quality of the proposed QuPUF.
Proceedings ArticleDOI
How Multi-Threshold Designs Can Protect Analog IPs
Abdullah Ash Saki,Swaroop Ghosh +1 more
TL;DR: This paper explores the possibility of multi-threshold voltage (VTH) design to protect the analog IP from Reverse Engineering (RE)-based attacks and proposes a technique like transistor splitting to increase the effort.