


default search action
Seetharam Narasimhan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j10]Tamzidul Hoque
, Seetharam Narasimhan, Xinmu Wang, Sanchita Mal-Sarkar, Swarup Bhunia
:
Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise. J. Electron. Test. 33(1): 107-124 (2017) - 2016
- [j9]Sanchita Mal-Sarkar, Robert Karam, Seetharam Narasimhan, Anandaroop Ghosh, Aswin Raghav Krishna, Swarup Bhunia
:
Design and Validation for FPGA Trust under Hardware Trojan Attacks. IEEE Trans. Multi Scale Comput. Syst. 2(3): 186-198 (2016) - [c22]Juan Portillo, Eugene John
, Seetharam Narasimhan:
Building trust in 3PIP using asset-based security property verification. VTS 2016: 1-6 - 2014
- [j8]Swarup Bhunia
, Michael S. Hsiao, Mainak Banga, Seetharam Narasimhan:
Hardware Trojan Attacks: Threat Analysis and Countermeasures. Proc. IEEE 102(8): 1229-1247 (2014) - 2013
- [j7]Seetharam Narasimhan, Dongdong Du, Rajat Subhra Chakraborty, Somnath Paul, Francis G. Wolff, Christos A. Papachristou
, Kaushik Roy, Swarup Bhunia
:
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis. IEEE Trans. Computers 62(11): 2183-2195 (2013) - [c21]Xinmu Wang, Wen Yueh, Debapriya Basu Roy, Seetharam Narasimhan, Yu Zheng, Saibal Mukhopadhyay, Debdeep Mukhopadhyay, Swarup Bhunia
:
Role of power grid in side channel attack and power-grid-aware secure design. DAC 2013: 78:1-78:9 - 2012
- [j6]Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Chakraborty:
Hardware IP Protection During Evaluation Using Embedded Sequential Trojan. IEEE Des. Test Comput. 29(3): 70-79 (2012) - [j5]Seetharam Narasimhan, Wen Yueh, Xinmu Wang, Saibal Mukhopadhyay, Swarup Bhunia
:
Improving IC Security Against Trojan Attacks Through Integration of Security Monitors. IEEE Des. Test Comput. 29(5): 37-46 (2012) - [j4]Seetharam Narasimhan, Keerthi Kunaparaju, Swarup Bhunia
:
Healing of DSP Circuits Under Power Bound Using Post-Silicon Operand Bitwidth Truncation. IEEE Trans. Circuits Syst. I Regul. Pap. 59-I(9): 1932-1941 (2012) - [c20]Xinmu Wang, Tatini Mal-Sarkar, Aswin Raghav Krishna, Seetharam Narasimhan, Swarup Bhunia
:
Software exploitable hardware Trojans in embedded processor. DFT 2012: 55-58 - [c19]Abhishek Basak, Vaishnavi Nattar Ranganathan, Seetharam Narasimhan, Swarup Bhunia
:
Implantable ultrasonic dual functional assembly for detection and treatment of anomalous growth. EMBC 2012: 170-173 - [c18]Xinmu Wang, Seetharam Narasimhan, Aswin Raghav Krishna, Swarup Bhunia
:
SCARE: Side-Channel Analysis Based Reverse Engineering for Post-Silicon Validation. VLSI Design 2012: 304-309 - [r1]Seetharam Narasimhan, Swarup Bhunia:
Ultralow-Power Implantable Electronics. Handbook of Energy-Aware and Green Computing 2012: 1097-1114 - 2011
- [j3]Seetharam Narasimhan, Hillel J. Chiel
, Swarup Bhunia
:
Ultra-Low-Power and Robust Digital-Signal-Processing Hardware for Implantable Neural Interface Microsystems. IEEE Trans. Biomed. Circuits Syst. 5(2): 169-178 (2011) - [c17]Aswin Raghav Krishna, Seetharam Narasimhan, Xinmu Wang, Swarup Bhunia
:
MECCA: A Robust Low-Overhead PUF Using Embedded Memory Array. CHES 2011: 407-420 - [c16]Xinmu Wang, Seetharam Narasimhan, Aswin Raghav Krishna, Francis G. Wolff, Srihari Rajgopal, Te-Hao Lee, Mehran Mehregany, Swarup Bhunia:
High-temperature (>500°C) reconfigurable computing using silicon carbide NEMS switches. DATE 2011: 1065-1070 - [c15]Abhishek Basak, Seetharam Narasimhan, Swarup Bhunia
:
Low-power implantable ultrasound imager for online monitoring of tumor growth. EMBC 2011: 2858-2861 - [c14]Seetharam Narasimhan, Xinmu Wang, Dongdong Du, Rajat Subhra Chakraborty, Swarup Bhunia
:
TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection. HOST 2011: 71-74 - [c13]Xinmu Wang, Seetharam Narasimhan, Aswin Raghav Krishna, Tatini Mal-Sarkar, Swarup Bhunia
:
Sequential hardware Trojan: Side-channel aware design and placement. ICCD 2011: 297-300 - [c12]Rajat Subhra Chakraborty, Seetharam Narasimhan, Swarup Bhunia
:
Embedded Software Security through Key-Based Control Flow Obfuscation. InfoSecHiComNet 2011: 30-44 - [c11]Xinmu Wang, Seetharam Narasimhan, Somnath Paul, Swarup Bhunia
:
NEMTronics: Symbiotic integration of nanoelectronic and nanomechanical devices for energy-efficient adaptive computing. NANOARCH 2011: 210-217 - [c10]Keerthi Kunaparaju, Seetharam Narasimhan, Swarup Bhunia
:
VaROT: Methodology for Variation-Tolerant DSP Hardware Design Using Post-Silicon Truncation of Operand Width. VLSI Design 2011: 310-315 - 2010
- [c9]Seetharam Narasimhan, Somnath Paul, Rajat Subhra Chakraborty, Francis G. Wolff, Christos A. Papachristou
, Daniel J. Weyer, Swarup Bhunia
:
System level self-healing for parametric yield and reliability improvement under power bound. AHS 2010: 52-58 - [c8]Dongdong Du, Seetharam Narasimhan, Rajat Subhra Chakraborty, Swarup Bhunia
:
Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection. CHES 2010: 173-187 - [c7]Seetharam Narasimhan, David R. McIntyre, Francis G. Wolff, Yu Zhou, Daniel J. Weyer, Swarup Bhunia
:
A supply-demand model based scalable energy management system for improved energy utilization efficiency. Green Computing Conference 2010: 97-105 - [c6]Seetharam Narasimhan, Rajat Subhra Chakraborty, Dongdong Du, Somnath Paul, Francis G. Wolff, Christos A. Papachristou
, Kaushik Roy, Swarup Bhunia
:
Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach. HOST 2010: 13-18
2000 – 2009
- 2009
- [c5]Rajat Subhra Chakraborty, Seetharam Narasimhan, Swarup Bhunia
:
Hardware Trojan: Threats and emerging solutions. HLDVT 2009: 166-171 - 2008
- [c4]Seetharam Narasimhan, Somnath Paul, Swarup Bhunia:
Collective computing based on swarm intelligence. DAC 2008: 349-350 - [c3]Matthew Seetharam A. Holtz, Seetharam Narasimhan, Swarup Bhunia
:
On-die CMOS voltage droop detection and dynamiccompensation. ACM Great Lakes Symposium on VLSI 2008: 35-40 - 2007
- [j2]Shreyas Sen, Seetharam Narasimhan, Amit Konar:
Biological Data Mining for Genomic Clustering Using Unsupervised Neural Learning. Eng. Lett. 14(2): 61-71 (2007) - [j1]Rajat Subhra Chakraborty, Seetharam Narasimhan, Swarup Bhunia
:
Hybridization of CMOS With CNT-Based Nano-Electromechanical Switch for Low Leakage and Robust Circuit Design. IEEE Trans. Circuits Syst. I Regul. Pap. 54-I(11): 2480-2488 (2007) - 2005
- [c2]Seetharam Narasimhan, Shreyas Sen, Amit Konar:
Application of Neural Networks to Biological Data Mining for Automatic Species Identification. IICAI 2005: 1507-1526 - [c1]Shreyas Sen, Seetharam Narasimhan, Amit Konar:
A Novel Algorithm for Automatic Species Identification Using Principal Component Analysis. PReMI 2005: 605-610
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint