Javad Bahrami

According to our database1, Javad Bahrami authored at least 13 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Digital Twin Based Topology Fingerprinting for Detecting False Data Injection Attacks in Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Communications, 2024

Securing ISW Masking Scheme Against Glitches.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024

Impact of Process Mismatch and Device Aging on SR-Latch Based True Random Number Generators.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024

Digital Twin Integrity Protection in Distributed Control Systems.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Special Session: Security Verification & Testing for SR-Latch TRNGs.
Proceedings of the 41st IEEE VLSI Test Symposium, 2023

Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks.
Proceedings of the International Conference on IC Design and Technology, 2023

Security Order of Gate-Level Masking Schemes.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

2022
Special Session: On the Reliability of Conventional and Quantum Neural Network Hardware.
Proceedings of the 40th IEEE VLSI Test Symposium, 2022

On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Leakage Power Analysis in Different S-Box Masking Protection Schemes.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

2020
Lightweight Implementation of the LowMC Block Cipher Protected Against Side-Channel Attacks.
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2020

2018
Neural-network-based robust hybrid force/position controller for a constrained robot manipulator with uncertainties.
Trans. Inst. Meas. Control, 2018

2010
Identifying a two linked robot with non-symmetrical modified friction and backlash-flexibility models.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010


  Loading...