scispace - formally typeset
S

Syed Rafay Hasan

Researcher at Tennessee Technological University

Publications -  100
Citations -  667

Syed Rafay Hasan is an academic researcher from Tennessee Technological University. The author has contributed to research in topics: Asynchronous communication & Hardware Trojan. The author has an hindex of 12, co-authored 90 publications receiving 484 citations. Previous affiliations of Syed Rafay Hasan include Concordia University & École Polytechnique de Montréal.

Papers
More filters
Proceedings ArticleDOI

A self-learning framework to detect the intruded integrated circuits

TL;DR: A self-learning framework that can detect the intruded integrated circuits and a cross validation comparison shows that eager learners are able to detect the intrusion with 96% accuracy and also require less amount of memory and processing power compared to other machine learning techniques.
Proceedings ArticleDOI

Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models

TL;DR: This paper argues that an intelligent intruder may intrude the IP-based SoC without disturbing the normal SoC operation or violating any protocols, and proposes a methodology to extract the power profile of the micro-controllers instruction sets which is in turn used to train a machine learning algorithm.
Proceedings ArticleDOI

FPGA-Based Convolutional Neural Network Architecture with Reduced Parameter Requirements

TL;DR: This paper proposes a novel reduced-parameter CNN architecture that can be used for image classification applications, which results in a significant network model size reduction and results in an efficient hardware deployment.
Journal ArticleDOI

MulNet: A Flexible CNN Processor With Higher Resource Utilization Efficiency for Constrained Devices

TL;DR: A novel and highly flexible DCNN processor, MulNet, which can be used to process most regular state-of-the-art CNN variants aiming at maximizing resource utilization of a target device and can be very expedient for resource constrained devices is proposed.
Journal ArticleDOI

Runtime hardware Trojan monitors through modeling burst mode communication using formal verification

TL;DR: A generic methodology, which leverages the burst mode communication protocol, to detect the intrusions during runtime with validated approach by applying it on the AES Trojan benchmarks that utilize intermodule interface to communicate with other modules in the system on chip (SoC).