S
Syed Rafay Hasan
Researcher at Tennessee Technological University
Publications - 100
Citations - 667
Syed Rafay Hasan is an academic researcher from Tennessee Technological University. The author has contributed to research in topics: Asynchronous communication & Hardware Trojan. The author has an hindex of 12, co-authored 90 publications receiving 484 citations. Previous affiliations of Syed Rafay Hasan include Concordia University & École Polytechnique de Montréal.
Papers
More filters
Proceedings ArticleDOI
A self-learning framework to detect the intruded integrated circuits
TL;DR: A self-learning framework that can detect the intruded integrated circuits and a cross validation comparison shows that eager learners are able to detect the intrusion with 96% accuracy and also require less amount of memory and processing power compared to other machine learning techniques.
Proceedings ArticleDOI
Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models
TL;DR: This paper argues that an intelligent intruder may intrude the IP-based SoC without disturbing the normal SoC operation or violating any protocols, and proposes a methodology to extract the power profile of the micro-controllers instruction sets which is in turn used to train a machine learning algorithm.
Proceedings ArticleDOI
FPGA-Based Convolutional Neural Network Architecture with Reduced Parameter Requirements
TL;DR: This paper proposes a novel reduced-parameter CNN architecture that can be used for image classification applications, which results in a significant network model size reduction and results in an efficient hardware deployment.
Journal ArticleDOI
MulNet: A Flexible CNN Processor With Higher Resource Utilization Efficiency for Constrained Devices
TL;DR: A novel and highly flexible DCNN processor, MulNet, which can be used to process most regular state-of-the-art CNN variants aiming at maximizing resource utilization of a target device and can be very expedient for resource constrained devices is proposed.
Journal ArticleDOI
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification
TL;DR: A generic methodology, which leverages the burst mode communication protocol, to detect the intrusions during runtime with validated approach by applying it on the AES Trojan benchmarks that utilize intermodule interface to communicate with other modules in the system on chip (SoC).