Zahra Kazemi

Orcid: 0000-0003-1095-2681

According to our database1, Zahra Kazemi authored at least 23 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Solving a class of Thomas-Fermi equations: A new solution concept based on physics-informed machine learning.
Math. Comput. Simul., 2024

Monitoring Reconfigurable Simulation Scenarios in Co-simulated Digital Twins.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Application Areas, 2024

Enabling Flexible Manufactuirng in Wind Industry Based on Movable Factory Concept: Definitions, Requirements, and Challenges.
Proceedings of the IEEE International Conference on Industrial Technology, 2024

2023
Artificial Intelligence-Based Diagnosis of Hydraulic Centrifugal Pumps Using Vibration Sensor: Feature Extraction and Failure Classification.
Proceedings of the 32nd IEEE International Symposium on Industrial Electronics, 2023

Experimental Evaluation of Delayed-Based Detectors Against Power-off Attack.
Proceedings of the 29th International Symposium on On-Line Testing and Robust System Design, 2023

Synthesizing Orchestration Algorithms for FMI 3.0.
Proceedings of the Annual Modeling and Simulation Conference, 2023

2022
A security-aware hardware scheduler for modern multi-core systems with hard real-time constraints.
Microprocess. Microsystems, November, 2022

Finite-Time Secure Dynamic State Estimation for Cyber-Physical Systems Under Unknown Inputs and Sensor Attacks.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Hardware Support for Efficient and Low-Power Data Sorting in Massive Data Application: The 3-D Sorting Method.
IEEE Consumer Electron. Mag., 2022

An Offline Hardware Security Assessment Approach using Symbol Assertion and Code Shredding.
Proceedings of the 23rd International Symposium on Quality Electronic Design, 2022

2021
Efficient Scheduling of Dependent Tasks in Many-Core Real-Time System Using a Hardware Scheduler.
Proceedings of the 2021 IEEE High Performance Extreme Computing Conference, 2021

An In-Depth Vulnerability Analysis of RISC-V Micro-Architecture Against Fault Injection Attack.
Proceedings of the 36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2021

2020
A Secure Hybrid Dynamic-State Estimation Approach for Power Systems Under False Data Injection Attacks.
IEEE Trans. Ind. Informatics, 2020

Online Parameter Estimation for Supercapacitor State-of-Energy and State-of-Health Determination in Vehicular Applications.
IEEE Trans. Ind. Electron., 2020

3D-Sorter: 3D Design of a Resource-Aware Hardware Sorter for Edge Computing Platforms Under Area and Energy Consumption Constraints.
Proceedings of the 2020 IEEE Computer Society Annual Symposium on VLSI, 2020

Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application.
Proceedings of the 26th IEEE International Symposium on On-Line Testing and Robust System Design, 2020

2019
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection.
Proceedings of the 4th IEEE International Verification and Security Workshop, 2019

On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks.
Proceedings of the 4th IEEE International Verification and Security Workshop, 2019

An Efficient Sorting Architecture for Area and Energy Constrained Edge Computing Devices.
Proceedings of the 17th International Conference on High Performance Computing & Simulation, 2019

2018
Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

2016
Risk Analysis for Knowledge Sharing in Tax Payment.
Int. J. Knowl. Based Organ., 2016

Hardware enlightening: No where to hide your Hardware Trojans!
Proceedings of the 22nd IEEE International Symposium on On-Line Testing and Robust System Design, 2016

2012
Security improvement for audio watermarking in image using BCH coding.
Proceedings of the 8th International Symposium on Communication Systems, 2012


  Loading...