default search action
Hassan Salmani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j11]Hassan Salmani:
Gradual-N-Justification (GNJ) to Reduce False-Positive Hardware Trojan Detection in Gate-Level Netlist. IEEE Trans. Very Large Scale Integr. Syst. 30(4): 515-525 (2022) - [c15]Hassan Salmani:
The Improved COTD Technique for Hardware Trojan Detection in Gate-level Netlist. ACM Great Lakes Symposium on VLSI 2022: 449-454 - [c14]Hassan Salmani:
Session details: Session 6B: Special Session - 2: Application-oriented Hardware Security Challenges and Solutions. ACM Great Lakes Symposium on VLSI 2022 - [d1]Hassan Salmani, Mark M. Tehranipoor, Sarwono Sutikno, Fajar Wijitrisnanto:
Trust-Hub Trojan Benchmark for Hardware Trojan Detection Model Creation using Machine Learning. IEEE DataPort, 2022 - 2021
- [j10]Prudence Phillips, Olaide R. Afolabi, Hassan Salmani:
Experimental Data Anomaly Detection at Edge Sensor Nodes Using Physics Laws. J. Hardw. Syst. Secur. 5(1): 19-31 (2021)
2010 – 2019
- 2019
- [c13]Hassan Salmani, Tamzidul Hoque, Swarup Bhunia, Muhammad Yasin, Jeyavijayan (JV) Rajendran, Naghmeh Karimi:
Special Session: Countering IP Security threats in Supply chain. VTS 2019: 1-9 - 2018
- [j9]Ted Winograd, Gaurav Shenoy, Hassan Salmani, Hamid Mahmoodi, Setareh Rafatirad, Houman Homayoun:
Programmable Gates Using Hybrid CMOS-STT Design to Prevent IC Reverse Engineering. ACM Trans. Design Autom. Electr. Syst. 23(6): 76:1-76:21 (2018) - 2017
- [j8]Bicky Shakya, Miao Tony He, Hassan Salmani, Domenic Forte, Swarup Bhunia, Mark M. Tehranipoor:
Benchmarking of Hardware Trojans and Maliciously Affected Circuits. J. Hardw. Syst. Secur. 1(1): 85-102 (2017) - [j7]Hassan Salmani:
COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist. IEEE Trans. Inf. Forensics Secur. 12(2): 338-350 (2017) - 2016
- [j6]Ragh Kuttappa, Houman Homayoun, Hassan Salmani, Hamid Mahmoodi:
Reliability analysis of spin transfer torque based look up tables under process variations and NBTI aging. Microelectron. Reliab. 62: 156-166 (2016) - [j5]Hassan Salmani, Mark M. Tehranipoor:
Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion. IEEE Trans. Inf. Forensics Secur. 11(6): 1214-1225 (2016) - [c12]Theodore Winograd, Hassan Salmani, Hamid Mahmoodi, Kris Gaj, Houman Homayoun:
Hybrid STT-CMOS designs for reverse-engineering prevention. DAC 2016: 88:1-88:6 - [c11]Aliyar Attaran, Hassan Salmani, Houman Homayoun, Hamid Mahmoodi:
Dynamic single and Dual Rail spin transfer torque look up tables with enhanced robustness under CMOS and MTJ process variations. ICCD 2016: 348-351 - [c10]Ragh Kuttappa, Houman Homayoun, Hassan Salmani, Hamid Mahmoodi:
Comparative analysis of robustness of spin transfer torque based look up tables under process variations. ISCAS 2016: 606-609 - [c9]Theodore Winograd, Hassan Salmani, Hamid Mahmoodi, Houman Homayoun:
Preventing design reverse engineering with reconfigurable spin transfer torque LUT gates. ISQED 2016: 242-247 - [c8]Darya Almasi, Houman Homayoun, Hassan Salmani, Hamid Mahmoodi:
Comparative analysis of hybrid Magnetic Tunnel Junction and CMOS logic circuits. SoCC 2016: 259-264 - 2013
- [c7]Hassan Salmani, Mohammad Tehranipoor:
Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level. DFTS 2013: 190-195 - [c6]Hassan Salmani, Mohammad Tehranipoor, Ramesh Karri:
On design vulnerability analysis and trust benchmarks development. ICCD 2013: 471-474 - 2012
- [j4]Hassan Salmani, Wei Zhao, Mohammad Tehranipoor, Sreejit Chakravarty, Patrick Girard, Xiaoqing Wen:
Layout-Aware Pattern Evaluation and Analysis for Power-Safe Application of Transition Delay Fault Patterns. J. Low Power Electron. 8(2): 248-258 (2012) - [j3]Hassan Salmani, Mohammad Tehranipoor:
Layout-Aware Switching Activity Localization to Enhance Hardware Trojan Detection. IEEE Trans. Inf. Forensics Secur. 7(1): 76-87 (2012) - [j2]Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic:
A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. IEEE Trans. Very Large Scale Integr. Syst. 20(1): 112-125 (2012) - 2011
- [j1]Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang, Michel Wang, Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld:
Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges. Computer 44(7): 66-74 (2011) - 2010
- [c5]Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic:
A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits. WIFS 2010: 1-6
2000 – 2009
- 2009
- [c4]Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic:
New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. HOST 2009: 66-73 - 2008
- [c3]Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoor, James F. Plusquellic:
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis. DFT 2008: 87-95 - 2005
- [c2]Hassan Salmani, Seyed Ghassem Miremadi:
Assessment of Message Missing Failures in CAN-based Systems. Parallel and Distributed Computing and Networks 2005: 387-392 - [c1]Hassan Salmani, Seyed Ghassem Miremadi:
Contribution of Controller Area Networks Controllers to Masquerade Failures. PRDC 2005: 310-316
Coauthor Index
aka: Mohammad Tehranipoor
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint