Tamzidul Hoque
University of Kansas
H-index: 12
North America-United States
Top articles of Tamzidul Hoque
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart Trojan Attacks in COTS Processor | arXiv preprint arXiv:2402.09701 | Tanvir Hossain Matthew Showers Mahmudul Hasan Tamzidul Hoque | 2024/2/15 |
Framework for obfuscation based watermarking | 2021/10/14 | ||
Resistive RAM-based PUF: Challenges and Opportunities | SM Mojahidul Ahsan Tanvir Hossain Md Sakib Hasan Tamzidul Hoque | 2023/4/14 | |
Potential and pitfalls of multi-valued logic circuits for hardware security | Tanvir Hossain SM Mojahidul Ahsan Tamzidul Hoque | 2023/4/14 | |
FPGA Hardware Trojan Detection: Golden-Free Machine Learning Approach | Ashutosh Ghimire Fathi Amsaad Tanvir Hossain Tamzidul Hoque Ahmed Sherif | 2023/8/28 | |
Unsupervised IC Security with Machine Learning for Trojan Detection | Ashutosh Ghimire Fathi Amsaad Tamzidul Hoque Kenneth Hopkinson Md Tauhidur Rahman | 2023/8/6 | |
Board 265: Engaging Students in Exploring Computer Hardware Fundamentals Using FPGA Board Games | Andrea Ramirez-Salgado Tanvir Hossain Tamzidul Hoque Swarup Bhunia Mary Jo Koroly | 2023/6/25 | |
Hardware IP assurance against trojan attacks with machine learning and post-processing | ACM Journal on Emerging Technologies in Computing Systems | Pravin Gaikwad Jonathan Cruz Prabuddha Chakraborty Swarup Bhunia Tamzidul Hoque | 2023 |
Golden-free hardware trojan detection using self-referencing | IEEE Transactions on Very Large Scale Integration (VLSI) Systems | Shuo Yang Tamzidul Hoque Prabuddha Chakraborty Swarup Bhunia | 2022/1/18 |
An automated framework for board-level trojan benchmarking | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | Aritra Bhattacharyay Shuo Yang Jonathan Cruz Prabuddha Chakraborty Swarup Bhunia | 2022/5/30 |
KEATON: Assertion-guided Attack on Combinational and Sequential Locking without Scan Access | Mahmudul Hasan Tamzidul Hoque | 2022/12/14 | |
Systems and methods for machine intelligence based malicious design alteration insertion | 2022/5/3 | ||
Trojan resilient computing in COTS processors under zero trust | IEEE Transactions on Very Large Scale Integration (VLSI) Systems | Mahmudul Hasan Jonathan Cruz Prabuddha Chakraborty Swarup Bhunia Tamzidul Hoque | 2022/8/17 |
A Semi-formal Information Flow Validation for Analyzing Secret Asset Propagation in COTS IC Integrated Systems | Xingyu Meng Mahmudul Hasan Kanad Basu Tamzidul Hoque | 2022/6/6 | |
Addressing the range anxiety of battery electric vehicles with charging en route | scientific reports | Prabuddha Chakraborty Robert Parker Tamzidul Hoque Jonathan Cruz Lili Du | 2022/4/4 |
LeGO: A learning-guided obfuscation framework for hardware IP protection | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | Abdulrahman Alaql Saranyu Chattopadhyay Prabuddha Chakraborty Tamzidul Hoque Swarup Bhunia | 2021/4/27 |
Hardware trojan attack in embedded memory | ACM Journal on Emerging Technologies in Computing Systems (JETC) | Xinmu Wang Tamzidul Hoque Abhishek Basak Robert Karam Wei Hu | 2021/1/6 |
Software variants for hardware trojan detection and resilience in COTS processors | arXiv preprint arXiv:2112.00304 | Mahmudul Hasan Jonathan Cruz Prabuddha Chakraborty Swarup Bhunia Tamzidul Hoque | 2021/12/1 |
Third-party hardware IP assurance against trojans through supervised learning and post-processing | arXiv preprint arXiv:2111.14956 | Pravin Gaikwad Jonathan Cruz Prabuddha Chakraborty Swarup Bhunia Tamzidul Hoque | 2021/11/29 |
Predictive Joint Compression and Encryption for Images and Videos | 2021/7/22 |