Ahmad Shabani

Orcid: 0000-0002-4690-4430

According to our database1, Ahmad Shabani authored at least 18 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Causes, consequences, and strategies to deal with information overload: A scoping review.
Int. J. Inf. Manag. Data Insights, 2024

2023
Future of information retrieval systems and the role of library and information science experts in their development.
J. Libr. Inf. Sci., March, 2023

DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices.
J. Netw. Comput. Appl., 2023

2022
A comparative study of machine learning classifiers for secure RF-PUF-based authentication in internet of things.
Microprocess. Microsystems, September, 2022

Hardware Patching Methodology for Neutralizing Timing Hardware Trojans Using Vulnerability Analysis and Time Borrowing Scheme.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices.
ISC Int. J. Inf. Secur., 2022

2021
Enhancing Hardware Trojan Detection Sensitivity Using Partition-Based Shuffling Scheme.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

SAT-Based Integrated Hardware Trojan Detection and Localization Approach Through Path-Delay Analysis.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

Area and Power-Efficient Variable-Sized DCT Architecture for HEVC Using Muxed-MCM Problem.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021

2020
PMTP: A MAX-SAT-Based Approach to Detect Hardware Trojan Using Propagation of Maximum Transition Probability.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

PODEM: A low-cost property-based design modification for detecting Hardware Trojans in resource-constraint IoT devices.
J. Netw. Comput. Appl., 2020

2019
Power and area efficient CORDIC-Based DCT using direct realization of decomposed matrix.
Microelectron. J., 2019

A New RF-PUF Based Authentication of Internet of Things Using Random Forest Classification.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2018
An infodemiology study on breast cancer in Iran: Health information supply versus health information demand in PubMed and Google Trends.
Electron. Libr., 2018

2017
Scientific Publication Behavior versus Information Seeking Behavior: An Infodemiological Study on Stomach Cancer.
Webology, 2017

Low-power DCT-based compressor for wireless capsule endoscopy.
Signal Process. Image Commun., 2017

2016
Mobility increases throughput of wireless device-to-device networks with coded caching.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2010
Examining the Citations Received by DOAJ's Journals from ISI Web of Science's Articles (2003-2008).
Int. J. Adv. Comp. Techn., 2010


  Loading...