default search action
Tamzidul Hoque
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Mahmudul Hasan, Tamzidul Hoque, Fatemeh Ganji, Damon L. Woodard, Domenic Forte, Sumaiya Shomaji:
A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication. J. Hardw. Syst. Secur. 8(3): 160-173 (2024) - [c19]Mrittika Chowdhury, Mahmudul Hasan, Tamzidul Hoque, Md Sakib Hasan:
Physically Unclonable and Reconfigurable Circuits for IP Protection: Opportunities and Challenges. ISVLSI 2024: 817-820 - [i5]Tanvir Hossain, Matthew Showers, Mahmudul Hasan, Tamzidul Hoque:
HOACS: Homomorphic Obfuscation Assisted Concealing of Secrets to Thwart Trojan Attacks in COTS Processor. CoRR abs/2402.09701 (2024) - [i4]Md. Mashfiq Rizvee, Tanvir Hossain, Tamzidul Hoque, Domenic Forte, Sumaiya Shomaji:
A Persistent Hierarchical Bloom Filter-based Framework for Authentication and Tracking of ICs. CoRR abs/2408.16950 (2024) - 2023
- [j9]Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque:
Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing. ACM J. Emerg. Technol. Comput. Syst. 19(3): 25:1-25:23 (2023) - [j8]Aritra Bhattacharyay, Shuo Yang, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque:
An Automated Framework for Board-Level Trojan Benchmarking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(2): 397-410 (2023) - [c18]Ashutosh Ghimire, Fathi H. Amsaad, Tamzidul Hoque, Kenneth M. Hopkinson, Md. Tauhidur Rahman:
Unsupervised IC Security with Machine Learning for Trojan Detection. MWSCAS 2023: 20-24 - 2022
- [j7]Abdulrahman Alaql, Saranyu Chattopadhyay, Prabuddha Chakraborty, Tamzidul Hoque, Swarup Bhunia:
LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(4): 854-867 (2022) - [j6]Shuo Yang, Tamzidul Hoque, Prabuddha Chakraborty, Swarup Bhunia:
Golden-Free Hardware Trojan Detection Using Self-Referencing. IEEE Trans. Very Large Scale Integr. Syst. 30(3): 325-338 (2022) - [j5]Mahmudul Hasan, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque:
Trojan Resilient Computing in COTS Processors Under Zero Trust. IEEE Trans. Very Large Scale Integr. Syst. 30(10): 1412-1424 (2022) - [c17]Mahmudul Hasan, Tamzidul Hoque:
KEATON: Assertion-guided Attack on Combinational and Sequential Locking without Scan Access. AsianHOST 2022: 1-6 - [c16]Xingyu Meng, Mahmudul Hasan, Kanad Basu, Tamzidul Hoque:
A Semi-formal Information Flow Validation for Analyzing Secret Asset Propagation in COTS IC Integrated Systems. ACM Great Lakes Symposium on VLSI 2022: 417-422 - 2021
- [i3]Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque:
Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing. CoRR abs/2111.14956 (2021) - [i2]Mahmudul Hasan, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque:
Software Variants for Hardware Trojan Detection and Resilience in COTS Processors. CoRR abs/2112.00304 (2021) - 2020
- [j4]Tamzidul Hoque, Patanjali SLPSK, Swarup Bhunia:
Trust Issues in Microelectronics: The Concerns and the Countermeasures. IEEE Consumer Electron. Mag. 9(6): 72-83 (2020) - [j3]Tamzidul Hoque, Rajat Subhra Chakraborty, Swarup Bhunia:
Hardware Obfuscation and Logic Locking: A Tutorial Introduction. IEEE Des. Test 37(3): 59-77 (2020) - [j2]Tamzidul Hoque, Kai Yang, Robert Karam, Shahin Tajik, Domenic Forte, Mark M. Tehranipoor, Swarup Bhunia:
Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks. ACM Trans. Design Autom. Electr. Syst. 25(1): 4:1-4:32 (2020) - [c15]Tamzidul Hoque, Patanjali SLPSK, Swarup Bhunia:
Trust Issues in COTS: The Challenges and Emerging Solution. ACM Great Lakes Symposium on VLSI 2020: 211-216 - [c14]Prabuddha Chakraborty, Robert Parker, Tamzidul Hoque, Jonathan Cruz, Swarup Bhunia:
P2C2: Peer-to-Peer Car Charging. VTC Spring 2020: 1-5 - [i1]Tamzidul Hoque, Shuo Yang, Aritra Bhattacharyay, Jonathan Cruz, Swarup Bhunia:
An Automated Framework for Board-level Trojan Benchmarking. CoRR abs/2003.12632 (2020)
2010 – 2019
- 2019
- [c13]Shuo Yang, Abdulrahman Alaql, Tamzidul Hoque, Swarup Bhunia:
Runtime Integrity Verification in Cyber-physical Systems using Side-Channel Fingerprint. ICCE 2019: 1-6 - [c12]Abdulrahman Alaql, Tamzidul Hoque, Domenic Forte, Swarup Bhunia:
Quality Obfuscation for Error-Tolerant and Adaptive Hardware IP Protection. VTS 2019: 1-6 - [c11]Hassan Salmani, Tamzidul Hoque, Swarup Bhunia, Muhammad Yasin, Jeyavijayan (JV) Rajendran, Naghmeh Karimi:
Special Session: Countering IP Security threats in Supply chain. VTS 2019: 1-9 - [p1]Atul Prasad Deb Nath, Tamzidul Hoque, Sandip Ray, Swarup Bhunia:
An Adaptable System-on-Chip Security Architecture for Internet of Things Applications. Security and Fault Tolerance in Internet of Things 2019: 61-85 - 2018
- [c10]Tamzidul Hoque, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia:
Hardware IP Trust Validation: Learn (the Untrustworthy), and Verify. ITC 2018: 1-10 - [c9]Tamzidul Hoque, Xinmu Wang, Abhishek Basak, Robert Karam, Swarup Bhunia:
Hardware Trojan attacks in embedded memory. VTS 2018: 1-6 - 2017
- [j1]Tamzidul Hoque, Seetharam Narasimhan, Xinmu Wang, Sanchita Mal-Sarkar, Swarup Bhunia:
Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise. J. Electron. Test. 33(1): 107-124 (2017) - [c8]Robert Karam, Tamzidul Hoque, Kevin R. B. Butler, Swarup Bhunia:
Mixed-granular architectural diversity for device security in the Internet of Things. AsianHOST 2017: 73-78 - [c7]Robert Karam, Tamzidul Hoque, Sandip Ray, Mark M. Tehranipoor, Swarup Bhunia:
MUTARCH: Architectural diversity for FPGA device and IP security. ASP-DAC 2017: 611-616 - 2016
- [c6]Sandip Ray, Tamzidul Hoque, Abhishek Basak, Swarup Bhunia:
The power play: Security-energy trade-offs in the IoT regime. ICCD 2016: 690-693 - [c5]Steven Paley, Tamzidul Hoque, Swarup Bhunia:
Active protection against PCB physical tampering. ISQED 2016: 356-361 - [c4]Robert Karam, Tamzidul Hoque, Sandip Ray, Mark M. Tehranipoor, Swarup Bhunia:
Technical demonstration session: Software toolflow for FPGA bitstream obfuscation. ReConFig 2016: 1-2 - [c3]Robert Karam, Tamzidul Hoque, Sandip Ray, Mark M. Tehranipoor, Swarup Bhunia:
Robust bitstream protection in FPGA-based systems through low-overhead obfuscation. ReConFig 2016: 1-8 - 2015
- [c2]Fathi Amsaad, Tamzidul Hoque, Mohammed Y. Niamat:
Analyzing the performance of a configurable ROPUF design controlled by programmable XOR gates. MWSCAS 2015: 1-4 - [c1]Tamzidul Hoque, Muslim Mustapa, Fathi Amsaad, Mohammed Y. Niamat:
Assessment of NAND based ring oscillator for hardware Trojan detection. MWSCAS 2015: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint