default search action
Bashir M. Sabquat Bahar Talukder
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Farah Ferdaus, Bashir M. Sabquat Bahar Talukder, Md. Tauhidur Rahman:
Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips. IEEE Trans. Inf. Forensics Secur. 19: 3608-3619 (2024) - [i9]Farah Ferdaus, Bashir M. Sabquat Bahar Talukder, Md Tauhidur Rahman:
Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips. CoRR abs/2401.04411 (2024) - 2023
- [j8]Mehdi Sadi, Bashir Mohammad Sabquat Bahar Talukder, Kaniz Mishty, Md. Tauhidur Rahman:
Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation. Inf. 14(9): 516 (2023) - [j7]Bashir M. Sabquat Bahar Talukder, Farah Ferdaus, Md. Tauhidur Rahman:
A Noninvasive Technique to Detect Authentic/Counterfeit SRAM Chips. ACM J. Emerg. Technol. Comput. Syst. 19(2): 11:1-11:25 (2023) - [j6]Farah Ferdaus, Bashir Mohammad Sabquat Bahar Talukder, Md. Tauhidur Rahman:
Approximate MRAM: High-Performance and Power-Efficient Computing With MRAM Chips for Error-Tolerant Applications. IEEE Trans. Computers 72(3): 668-681 (2023) - 2022
- [c8]Farah Ferdaus, Bashir Mohammad Sabquat Bahar Talukder, Md. Tauhidur Rahman:
Watermarked ReRAM: A Technique to Prevent Counterfeit Memory Chips. ACM Great Lakes Symposium on VLSI 2022: 21-26 - [i8]Farah Ferdaus, Bashir M. Sabquat Bahar Talukder, Md. Tauhidur Rahman:
Watermarked ReRAM: A Technique to Prevent Counterfeit Memory Chips. CoRR abs/2204.02104 (2022) - 2021
- [j5]Bashir M. Sabquat Bahar Talukder, Farah Ferdaus, Md. Tauhidur Rahman:
Memory-Based PUFs are Vulnerable as Well: A Non-Invasive Attack Against SRAM PUFs. IEEE Trans. Inf. Forensics Secur. 16: 4035-4049 (2021) - [j4]M. Imtiaz Rashid, Farah Ferdaus, Bashir M. Sabquat Bahar Talukder, Paul Henny, Aubrey N. Beal, Md. Tauhidur Rahman:
True Random Number Generation Using Latency Variations of FRAM. IEEE Trans. Very Large Scale Integr. Syst. 29(1): 14-23 (2021) - [c7]Farah Ferdaus, Bashir M. Sabquat Bahar Talukder, Mehdi Sadi, Md. Tauhidur Rahman:
True Random Number Generation using Latency Variations of Commercial MRAM Chips. ISQED 2021: 510-515 - [i7]Farah Ferdaus, Bashir M. Sabquat Bahar Talukder, Mehdi Sadi, Md. Tauhidur Rahman:
True Random Number Generation using Latency Variations of Commercial MRAM Chips. CoRR abs/2104.00198 (2021) - [i6]Farah Ferdaus, Bashir M. Sabquat Bahar Talukder, Md. Tauhidur Rahman:
Approximate MRAM: High-performance and Power-efficient Computing with MRAM Chips for Error-tolerant Applications. CoRR abs/2105.14151 (2021) - [i5]Bashir M. Sabquat Bahar Talukder, Farah Ferdaus, Md. Tauhidur Rahman:
A Non-invasive Technique to Detect Authentic/Counterfeit SRAM Chips. CoRR abs/2107.09199 (2021) - [i4]Mehdi Sadi, Bashir M. Sabquat Bahar Talukder, Kaniz Mishty, Md. Tauhidur Rahman:
Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation. CoRR abs/2111.09488 (2021) - 2020
- [c6]Bashir M. Sabquat Bahar Talukder, Vineetha Menon, Biswajit Ray, Tempestt J. Neal, Md. Tauhidur Rahman:
Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin. HOST 2020: 111-121
2010 – 2019
- 2019
- [j3]Bashir M. Sabquat Bahar Talukder, Biswajit Ray, Domenic Forte, Md. Tauhidur Rahman:
PreLatPUF: Exploiting DRAM Latency Variations for Generating Robust Device Signatures. IEEE Access 7: 81106-81120 (2019) - [j2]Novia Nurain, Bashir M. Sabquat Bahar Talukder, Tanzila Choudhury, Suraiya Tairin, Marjan Ferdousi, Mahmuda Naznin, A. B. M. Alim Al Islam:
Exploring network-level performances of wireless nanonetworks utilizing gains of different types of nano-antennas with different materials. Wirel. Networks 25(5): 2651-2664 (2019) - [c5]Bashir M. Sabquat Bahar Talukder, Joseph Kerns, Biswajit Ray, Thomas H. Morris, Md. Tauhidur Rahman:
Exploiting DRAM Latency Variations for Generating True Random Numbers. ICCE 2019: 1-6 - [i3]Bashir M. Sabquat Bahar Talukder, Vineetha Menon, Biswajit Ray, Tempestt J. Neal, Md. Tauhidur Rahman:
Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin. CoRR abs/1911.03395 (2019) - 2018
- [j1]Sadman Sakib, Preeti Kumari, Bashir M. Sabquat Bahar Talukder, Md. Tauhidur Rahman, Biswajit Ray:
Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics †. Cryptogr. 2(3): 17 (2018) - [c4]Bashir M. Sabquat Bahar Talukder, Emil Jovanov, David C. Schwebel, W. Douglas Evans:
A New Method to Prevent Unintentional Child Poisoning. EMBC 2018: 5142-5145 - [c3]Preeti Kumari, Bashir M. Sabquat Bahar Talukder, Sadman Sakib, Biswajit Ray, Md. Tauhidur Rahman:
Independent detection of recycled flash memory: Challenges and solutions. HOST 2018: 89-95 - [i2]Bashir M. Sabquat Bahar Talukder, Joseph Kerns, Biswajit Ray, Thomas H. Morris, Md. Tauhidur Rahman:
Exploiting DRAM Latency Variations for Generating True Random Numbers. CoRR abs/1808.02068 (2018) - [i1]Bashir M. Sabquat Bahar Talukder, Biswajit Ray, Mark M. Tehranipoor, Domenic Forte, Md. Tauhidur Rahman:
LDPUF: Exploiting DRAM Latency Variations to Generate Robust Device Signatures. CoRR abs/1808.02584 (2018) - 2016
- [c2]Bashir M. Sabquat Bahar Talukder, Brinta Chowdhury, Tamanna Howlader, S. M. Mahbubur Rahman:
Intelligent Recognition of Spontaneous Expression Using Motion Magnification of Spatio-temporal Data. PAISI 2016: 114-128 - 2015
- [c1]Kazi Sinthia Kabir, Iftakhar Ahmad, Akhter Al Amin, Maruf Zaber, Tanzila Choudhury, Bashir M. Sabquat Bahar Talukder, A. B. M. Alim Al Islam:
Q-Nerve: Propagating signal of a damaged nerve using quantum networking. NSysS 2015: 1-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint