Avesta Sasan
George Mason University
H-index: 28
North America-United States
Top articles of Avesta Sasan
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Effective Malware Detection for Embedded Computing Systems with Limited Exposure | arXiv preprint arXiv:2404.02344 | Sreenitha Kasarapu Sanket Shukla Rakibul Hassan Avesta Sasan Houman Homayoun | 2024/4/2 |
Optimized and Automated Secure IC Design Flow: A Defense-in-Depth Approach | IEEE Transactions on Circuits and Systems I: Regular Papers | Kevin Immanuel Gubbi Banafsheh Saber Latibari Muhtasim Alam Chowdhury Afrooz Jalilzadeh Erfan Yazdandoost Hamedani | 2024/2/22 |
Hardware trojan detection using machine learning: A tutorial | Kevin Immanuel Gubbi Banafsheh Saber Latibari Anirudh Srikanth Tyler Sheaves Sayed Arash Beheshti-Shirazi | 2023/4/19 | |
HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion | arXiv preprint arXiv:2312.13530 | Yu-Zheng Lin Muntasir Mamun Muhtasim Alam Chowdhury Shuyu Cai Mingyu Zhu | 2023/12/21 |
Gotcha! i know what you are doing on the fpga cloud: Fingerprinting co-located cloud fpga accelerators via measuring communication links | Chongzhou Fang Ning Miao Han Wang Jiacheng Zhou Tyler Sheaves | 2023/11/15 | |
A survey on fhe acceleration | Banafsheh Saber Latibari Kevin Immanuel Gubbi Houman Homayoun Avesta Sasan | 2023/4/14 | |
SMOOT: Saliency Guided Mask Optimized Online Training | arXiv preprint arXiv:2310.00772 | Ali Karkehabadi Avesta Sasan | 2023/10/1 |
Advanced Reinforcement Learning Solution for Clock Skew Engineering: Modified Q-Table Update Technique for Peak Current and IR Drop Minimization | IEEE Access | Sayed Aresh Beheshti-Shirazi Najmeh Nazari Kevin Immanuel Gubbi Banafsheh Saber Latibari Setareh Rafatirad | 2023/8/11 |
Securing AI Hardware: Challenges in Detecting and Mitigating Hardware Trojans in ML Accelerators | Kevin Immanuel Gubbi Inderpreet Kaur Abdallah Hashem Sai Manoj PD Houman Homayoun | 2023/8/6 | |
Neuromorphic-enabled security for iot | Soheil Salehi Tyler Sheaves Kevin Immanuel Gubbi Sayed Arash Beheshti Sai Manoj PD | 2022/6/19 | |
Adaptive-Gravity: A Defense Against Adversarial Samples | Ali Mirzaeian Zhi Tian Sai Manoj PD Banafsheh S Latibari Ioannis Savidis | 2022/4/6 | |
Sequential and Combinational Satisfiability Attacks | Encyclopedia of Cryptography, Security and Privacy | Avesta Sasan Kimia Zamiri Azar Hadi Mardani Kamali S Jajodia P Samarati | 2022/1/7 |
Cad-fsl: Code-aware data generation based few-shot learning for efficient malware detection | Sreenitha Kasarapu Sanket Shukla Rakibul Hassan Avesta Sasan Houman Homayoun | 2022/6/6 | |
Silicon validation of LUT-based logic-locked IP cores | Gaurav Kolhe Tyler Sheaves Kevin Immanuel Gubbi Tejas Kadale Setareh Rafatirad | 2022/7/10 | |
RAPTA: A Hierarchical Representation Learning Solution For Real-Time Prediction of Path-Based Static Timing Analysis | Tanmoy Chowdhury Ashkan Vakil Banafsheh Latibari Seyed Beheshti Ali Mirzaeian | 2022/3 | |
LOCK&ROLL: Deep-learning power side-channel attack mitigation using emerging reconfigurable devices and logic locking | Gaurav Kolhe Tyler Sheaves Kevin Immanuel Gubbi Soheil Salehi Setareh Rafatirad | 2022/7/10 | |
Survey of machine learning for electronic design automation | Kevin Immanuel Gubbi Sayed Aresh Beheshti-Shirazi Tyler Sheaves Soheil Salehi Sai Manoj PD | 2022/6/6 | |
Breaking the Design and Security Trade-off of Look-up-table–based Obfuscation | ACM Transactions on Design Automation of Electronic Systems (TODAES) | Gaurav Kolhe Tyler David Sheaves Hamid Mahmoodi Setareh Rafatirad Avesta Sasan | 2022/6/27 |
Analysis of the Security Vulnerabilities of 2.5-D and 3-D Integrated Circuits | Vaibhav Venugopal Rao Avesta Sasan Ioannis Savidis | 2022/4/6 | |
Learning assisted side channel delay test for detection of recycled ics | Ashkan Vakil Farzad Niknia Ali Mirzaeian Avesta Sasan Naghmeh Karimi | 2021/1/18 |