default search action
Muhammad Khurram Bhatti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Umer Farooq, Imran Baig, Muhammad Khurram Bhatti, Habib Mehrez, Arun Kumar, Manoj Gupta:
Prototyping using multi-FPGA platform: A novel and complete flow. Microprocess. Microsystems 96: 104751 (2023) - [c20]Muhammad Adnan Siddique, Abdul Basit, Nida Qayyum, Ehtasham Naseer, Muhammad Khurram Bhatti, Brent Minchew, Mohsen Ali, Cristian Silva-Perez, Armando Marino:
Towards Automated Monitoring Of Glacial Lakes In Hindu Kush And Himalayas Using Deep Learning. IGARSS 2023: 2165-2168 - 2022
- [j14]Maria Mushtaq, Muhammad Muneeb Yousaf, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat:
The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection. Ann. des Télécommunications 77(11-12): 731-747 (2022) - [j13]Tania Lorido-Botran, Muhammad Khurram Bhatti:
ImpalaE: Towards an optimal policy for efficient resource management at the edge. J. Edge Comput. 1(1): 43-54 (2022) - [j12]Abdul Basit, Muhammad Adnan Siddique, Muhammad Khurram Bhatti, Muhammad Saquib Sarfraz:
Comparison of CNNs and Vision Transformers-Based Hybrid Models Using Gradient Profile Loss for Classification of Oil Spills in SAR Images. Remote. Sens. 14(9): 2085 (2022) - [c19]Abdul Basit, Muhammad Khurram Bhatti, Mohsen Ali, Tooba Fatima, Brent Minchew, Muhammad Adnan Siddique:
Deep Learning for Monitoring Glacial Lakes Formation using Sentinel 2 Multispectral Data. IGARSS 2022: 179-182 - [c18]Saqib Javed, Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat:
Novel Design for IE-Cache to Mitigate Conflict-based Cache-side Channel Attacks with Reduced Energy Consumption. SECRYPT 2022: 675-680 - 2021
- [j11]Maryam Idrees, Mohammed Manzar Maqbool, Muhammad Khurram Bhatti, Muhammad Mahboob Ur Rahman, Rehan Hafiz, Muhammad Shafique:
An approximate-computing empowered green 6G downlink. Phys. Commun. 49: 101444 (2021) - [c17]Tania Lorido-Botran, Muhammad Khurram Bhatti:
Adaptive Container Scheduling in Cloud Data Centers: A Deep Reinforcement Learning Approach. AINA (3) 2021: 572-581 - [c16]Tania Lorido-Botran, Muhammad Khurram Bhatti:
ImpalaE: Towards an optimal policy for efficient resource management at the edge. QuaInT+doors 2021: 71-82 - [c15]Maria Mushtaq, David Novo, Florent Bruguier, Pascal Benoit, Muhammad Khurram Bhatti:
Transit-Guard: An OS-based Defense Mechanism Against Transient Execution Attacks. ETS 2021: 1-2 - 2020
- [j10]Ayaz Akram, Maria Mushtaq, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat:
Meet the Sherlock Holmes' of Side Channel Leakage: A Survey of Cache SCA Detection Techniques. IEEE Access 8: 70836-70860 (2020) - [j9]Maria Mushtaq, Jeremy Bricq, Muhammad Khurram Bhatti, Ayaz Akram, Vianney Lapotre, Guy Gogniat, Pascal Benoit:
WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks. IEEE Access 8: 83871-83900 (2020) - [j8]Maria Mushtaq, Muhammad Asim Mukhtar, Vianney Lapotre, Muhammad Khurram Bhatti, Guy Gogniat:
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA. Inf. Syst. 92: 101524 (2020) - [j7]Muhammad Asim Mukhtar, Maria Mushtaq, Muhammad Khurram Bhatti, Vianney Lapotre, Guy Gogniat:
FLUSH + PREFETCH: A countermeasure against access-driven cache-based side-channel attacks. J. Syst. Archit. 104: 101698 (2020) - [c14]Muhammad Asim Mukhtar, Muhammad Khurram Bhatti, Guy Gogniat:
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Eviction. SEC 2020: 32-45
2010 – 2019
- 2019
- [j6]Isil Öz, Muhammad Khurram Bhatti, Konstantin Popov, Mats Brorsson:
Regression-Based Prediction for Task-Based Program Performance. J. Circuits Syst. Comput. 28(4): 1950060:1-1950060:30 (2019) - [c13]Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Usman Ali, Vianney Lapotre, Guy Gogniat:
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture. CNS 2019: 64-72 - 2018
- [j5]Muhammad Khurram Bhatti, Isil Öz, Sarah Amin, Maria Mushtaq, Umer Farooq, Konstantin Popov, Mats Brorsson:
Locality-aware task scheduling for homogeneous parallel computing systems. Computing 100(6): 557-595 (2018) - [j4]Umer Farooq, Habib Mehrez, Muhammad Khurram Bhatti:
Inter-FPGA interconnect topologies exploration for multi-FPGA systems. Des. Autom. Embed. Syst. 22(1-2): 117-140 (2018) - [c12]Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Rao Naveed Bin Rais, Vianney Lapotre, Guy Gogniat:
Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm. GIIS 2018: 1-5 - [c11]Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Maham Chaudhry, Muhammad Muneeb Yousaf, Umer Farooq, Vianney Lapotre, Guy Gogniat:
Machine Learning For Security: The Case of Side-Channel Attack Detection at Run-time. ICECS 2018: 485-488 - [c10]Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Maham Chaudhry, Vianney Lapotre, Guy Gogniat:
NIGHTs-WATCH: a cache-based side-channel intrusion detector using hardware performance counters. HASP@ISCA 2018: 1:1-1:8 - 2017
- [c9]Umer Farooq, Habib Mehrez, Muhammad Khurram Bhatti:
Comparison of direct and switch-based inter-FPGA routing interconnect for multi-FPGA systems. ReConFig 2017: 1-6 - 2016
- [j3]Sébastien Bilavarn, Jabran Khan, Cécile Belleudy, Muhammad Khurram Bhatti:
Effectiveness of power strategies for video applications: a practical study. J. Real Time Image Process. 12(1): 123-132 (2016) - [c8]Umer Farooq, Muhammad Khurram Bhatti, M. Hassan Aslam:
A novel heterogeneous FPGA architecture based on memristor-transistor hybrid approach. DTIS 2016: 1-6 - 2014
- [c7]Muhammad Khurram Bhatti, Isil Öz, Ananya Muddukrishna, Konstantin Popov, Mats Brorsson:
Noodle: A Heuristic Algorithm for Task Scheduling in MPSoC Architectures. DSD 2014: 667-670 - 2013
- [c6]Jabran Khan, Sébastien Bilavarn, Muhammad Khurram Bhatti, Cécile Belleudy:
Energy Analysis of a Real-time Multiprocessor Control of Idle States. PECCS 2013: 125-130 - 2012
- [c5]Muhammad Khurram Bhatti, Cécile Belleudy, Michel Auguin:
A semi-partitioned real-time scheduling approach for periodic task systems on multicore platforms. SAC 2012: 1594-1601 - 2011
- [b1]Muhammad Khurram Bhatti:
Energy-aware Scheduling for Multiprocessor Real-time Systems. University of Nice Sophia Antipolis, France, 2011 - [j2]Muhammad Khurram Bhatti, Cécile Belleudy, Michel Auguin:
Two-level Hierarchical Scheduling Algorithm for Real-time Multiprocessor Systems. J. Softw. 6(11): 2308-2320 (2011) - [j1]Muhammad Khurram Bhatti, Cécile Belleudy, Michel Auguin:
Hybrid power management in real time embedded systems: an interplay of DVFS and DPM techniques. Real Time Syst. 47(2): 143-162 (2011) - 2010
- [c4]Muhammad Khurram Bhatti, Cécile Belleudy, Michel Auguin:
An inter-task real time DVFS scheme for multiprocessor embedded systems. DASIP 2010: 136-143 - [c3]Muhammad Khurram Bhatti, Cécile Belleudy, Michel Auguin:
Power Management in Real Time Embedded Systems through Online and Adaptive Interplay of DPM and DVFS Policies. EUC 2010: 184-191
2000 – 2009
- 2009
- [c2]Muhammad Khurram Bhatti, Cécile Belleudy, Michel Auguin:
A framework for offline optimization of energy consumption in real time multiprocessor system-on-chip. ICECS 2009: 900-903 - [c1]Muhammad Khurram Bhatti, Muhammad Farooq, Cécile Belleudy, Michel Auguin, Ons Mbarek:
Assertive Dynamic Power Management (AsDPM) Strategy for Globally Scheduled RT Multiprocessor Systems. PATMOS 2009: 116-126
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint