A study on the efficiency of hardware Trojan detection based on path-delay fingerprinting A Nejat, SMH Shekarian, MS Zamani Microprocessors and Microsystems 38 (3), 246-252, 2014 | 36 | 2014 |
Neutralizing a design-for-hardware-trust technique SMH Shekarian, MS Zamani, S Alami The 17th CSI International Symposium on Computer Architecture & Digital …, 2013 | 20 | 2013 |
Improving hardware Trojan detection by retiming SMH Shekarian, MS Zamani Microprocessors and Microsystems 39 (3), 145-156, 2015 | 19 | 2015 |
A trust-driven placement approach: A new perspective on design for hardware trust SMH Shekarian, MS Zamani Journal of Circuits, Systems and Computers 24 (08), 1550115, 2015 | 7 | 2015 |
A low power error detection technique for floating-point units in embedded applications SMH Shekarian, A Ejlali, SG Miremadi 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008 | 7 | 2008 |
An effective application of obfuscated TMR to tackle hardware Trojans MM Siboni, SM Shekarian 2019 9th International Conference on Computer and Knowledge Engineering …, 2019 | 1 | 2019 |
A Modified ACO: Improving Performance by Avoiding Premature Convergence. E Sherafat, L Hafezi, MH Shekarian GEM, 158-161, 2008 | 1 | 2008 |