Ahmad Shabani
Orcid: 0000-0002-4690-4430
According to our database1,
Ahmad Shabani
authored at least 18 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Causes, consequences, and strategies to deal with information overload: A scoping review.
Int. J. Inf. Manag. Data Insights, 2024
2023
Future of information retrieval systems and the role of library and information science experts in their development.
J. Libr. Inf. Sci., March, 2023
DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices.
J. Netw. Comput. Appl., 2023
2022
A comparative study of machine learning classifiers for secure RF-PUF-based authentication in internet of things.
Microprocess. Microsystems, September, 2022
Hardware Patching Methodology for Neutralizing Timing Hardware Trojans Using Vulnerability Analysis and Time Borrowing Scheme.
IEEE Trans. Circuits Syst. II Express Briefs, 2022
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices.
ISC Int. J. Inf. Secur., 2022
2021
Enhancing Hardware Trojan Detection Sensitivity Using Partition-Based Shuffling Scheme.
IEEE Trans. Circuits Syst. II Express Briefs, 2021
SAT-Based Integrated Hardware Trojan Detection and Localization Approach Through Path-Delay Analysis.
IEEE Trans. Circuits Syst. II Express Briefs, 2021
Area and Power-Efficient Variable-Sized DCT Architecture for HEVC Using Muxed-MCM Problem.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021
2020
PMTP: A MAX-SAT-Based Approach to Detect Hardware Trojan Using Propagation of Maximum Transition Probability.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
PODEM: A low-cost property-based design modification for detecting Hardware Trojans in resource-constraint IoT devices.
J. Netw. Comput. Appl., 2020
2019
Power and area efficient CORDIC-Based DCT using direct realization of decomposed matrix.
Microelectron. J., 2019
A New RF-PUF Based Authentication of Internet of Things Using Random Forest Classification.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019
2018
An infodemiology study on breast cancer in Iran: Health information supply versus health information demand in PubMed and Google Trends.
Electron. Libr., 2018
2017
Scientific Publication Behavior versus Information Seeking Behavior: An Infodemiological Study on Stomach Cancer.
Webology, 2017
Signal Process. Image Commun., 2017
2016
Mobility increases throughput of wireless device-to-device networks with coded caching.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2010
Examining the Citations Received by DOAJ's Journals from ISI Web of Science's Articles (2003-2008).
Int. J. Adv. Comp. Techn., 2010