Dr Basel Halak
University of Southampton
H-index: 17
Europe-United Kingdom
Top articles of Dr Basel Halak
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
A method for swift selection of appropriate approximate multipliers for CNN hardware accelerators | Peiyao Sun Haosen Yu Basel Halak Tomasz Kazmierski | 2024/5/20 | |
DL2Fence: Integrating Deep Learning and Frame Fusion for Enhanced Detection and Localization of Refined Denial-of-Service in Large-Scale NoCs | arXiv preprint arXiv:2403.13563 | Haoyu Wang Basel Halak Jianjie Ren Ahmad Atamli | 2024/3/20 |
Global supply chains security: a comparative analysis of emerging threats and traceability solutions | Betul Gokkaya Erisa Karafili Leonardo Aniello Basel Halak | 2024/3/4 | |
Evaluation of Performance, Energy, and Computation Costs of Quantum-Attack Resilient Encryption Algorithms for Embedded Devices | IEEE Access | Basel Halak Thomas Gibson Millicent Henley Cristin-Bianca Botea Benjamin Heath | 2024/1/8 |
A Methodology for Cybersecurity Risk Assessment in Supply Chains | Betul Gokkaya Leonardo Aniello Erisa Karafili Basel Halak | 2023/9/25 | |
Hardware trojan detection and high-precision localization in noc-based mpsoc using machine learning | Haoyu Wang Basel Halak | 2023/1/16 | |
A PUF Based on the Non-Linearity of Memristors | Callum Aitchison Basel Halak Alex Serb Themis Prodromakis | 2023/7/31 | |
A memristor fingerprinting and characterisation methodology for hardware security | Scientific Reports | Callum Aitchison Basel Halak Alex Serb Themis Prodromakis | 2023/6/9 |
Software supply chain: review of attacks, risk assessment strategies and security controls | Betul Gokkaya Leonardo Aniello Basel Halak | 2023/5/23 | |
Tamper Resistant Design of Convolutional Neural Network Hardware Accelerator | Haosen Yu Peiyao Sun Basel Halak Karthik Shanthakumar Tomasz Kazmierski | 2023/12/13 | |
Cascaded Machine Learning Model Based DoS Attacks Detection and Classification in NoC | Shengkai Hu Haoyu Wang Basel Halak | 2023/5/21 | |
Intelligent Anti-tamper Design for Embedded Systems Using Machine Learning | Basel Halak Christian Hall Syed Abdul Fathir Nelson Chow Wai Kit Ruwaydah Widaad Raymode | 2022/4/23 | |
Applications of Machine Learning in Hardware Security | Basel Halak Mohd Syafiq Mispan | 2022/5/9 | |
Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications | Ieee Access | Basel Halak Yildiran Yilmaz Daniel Shiu | 2022/7/21 |
Machine Learning for Embedded System Security | Basel Halak | 2022/4/22 | |
Linear detection techniques for MIMO | Ibrahim Bello Basel Halak | 2022/4/29 | |
An overview of machine learning applications in hardware security | Basel Halak Mohd Syafiq Mispan | 2022/6/6 | |
Correction to “Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications” | IEEE Access | Basel Halak Yildiran Yilmaz Daniel Shiu | 2022/11/16 |
A tutorial on adversarial learning attacks and countermeasures | Cato Pauling Michael Gimson Muhammed Qaid Ahmad Kida Basel Halak | 2022/2/21 | |
Algorithm and VLSI Implementation of Sphere Decoding | Ibrahim Bello Basel Halak | 2022/4/29 |