default search action
Mohammed Y. Niamat
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j8]Akshay R. Kulkarni, Noor Ahmad Hazari, Mohammed Y. Niamat:
A Zero Trust-Based Framework Employing Blockchain Technology and Ring Oscillator Physical Unclonable Functions for Security of Field Programmable Gate Array Supply Chain. IEEE Access 12: 89322-89338 (2024) - [j7]Faris Alsulami, Akshay R. Kulkarni, Noor Ahmad Hazari, Mohammed Y. Niamat:
ZEBRA: Zero Trust Architecture Employing Blockchain Technology and ROPUF for AMI Security. IEEE Access 12: 119868-119883 (2024) - 2021
- [j6]Ahmed Oun, Noor Ahmad Hazari, Mohammed Y. Niamat:
Analysis of Swarm Intelligence Based ANN Algorithms for Attacking PUFs. IEEE Access 9: 121743-121758 (2021) - [j5]Fathi H. Amsaad, Ahmed Oun, Mohammed Y. Niamat, Abdul Razaque, Selçuk Köse, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami:
Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security. IEEE Access 9: 136792-136810 (2021) - [j4]Noor Ahmad Hazari, Ahmed Oun, Mohammed Y. Niamat:
Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures. ACM J. Emerg. Technol. Comput. Syst. 17(3): 36:1-36:20 (2021) - 2018
- [j3]Fathi Amsaad, Mohammed Y. Niamat, Amer Dawoud, Selçuk Köse:
Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks. Inf. 9(9): 224 (2018) - [j2]Muslim Mustapa, Mohammed Y. Niamat, Atul Prasad Deb Nath, Mansoor Alam:
Hardware-Oriented Authentication for Advanced Metering Infrastructure. IEEE Trans. Smart Grid 9(2): 1261-1270 (2018) - 2007
- [j1]Laurence Tianruo Yang, José G. Delgado-Frias, Yiming Li, Mohammed Y. Niamat, Dimitrios Soudris, Srinivasa Vemuru:
Preface. Integr. 40(2): 61 (2007)
Conference and Workshop Papers
- 2024
- [c40]Akshay R. Kulkarni, Amrit Niraula, Hrishav Bhattarai, Mohammed Y. Niamat:
A Zero Trust Architecture employing Blockchain and Ring Oscillator Physical Unclonable Function for Internet-of-Things. EIT 2024: 508-513 - [c39]Muskan Saraf, Talha Hussain Syed, Akshay R. Kulkarni, Mohammed Y. Niamat:
Hardware Trojan Detection employing Machine Learning, Physical Unclonable Functions and Side Channel Analysis. EIT 2024: 514-519 - 2023
- [c38]Ahmed Oun, Mohammed Y. Niamat:
PUF-Based Authentication for the Security of IoT Devices. eIT 2023: 67-70 - [c37]Akshay R. Kulkarni, Noor Ahmad Hazari, Mohammed Y. Niamat:
Towards Blockchain-enabled Mask Writing for Security against Hardware Trojan Intrusion. eIT 2023: 436-441 - [c36]Akshay R. Kulkarni, Noor Ahmad Hazari, Mohammed Y. Niamat:
Ring Oscillator PUF and Blockchain: A Way of Securing Post Fabrication FPGA Supply Chain. MWSCAS 2023: 35-39 - 2021
- [c35]Ahmed Oun, Mohammed Y. Niamat:
Design of a Delay-Based FPGA PUF Resistant to Machine Learning Attacks. MWSCAS 2021: 865-868 - 2020
- [c34]Faris Alsulami, Mohammed Y. Niamat:
Performance Study of FPGA Based AND-Inverter Ring Oscillator PUFs. EIT 2020: 194-199 - [c33]Ahmed Oun, Mohammed Y. Niamat:
Defense Mechanism Vulnerability Analysis of Ring Oscillator PUFs Against Neural Network Modeling Attacks using the Dragonfly Algorithm. EIT 2020: 378-382 - 2019
- [c32]Noor Ahmad Hazari, Ahmed Oun, Mohammed Y. Niamat:
Analysis and Machine Learning Vulnerability Assessment of XOR-Inverter based Ring Oscillator PUF Design. MWSCAS 2019: 590-593 - 2017
- [c31]Muhtadi Choudhury, Nitin Pundir, Mohammed Y. Niamat, Muslim Mustapa:
Analysis of a novel stage configurable ROPUF design. MWSCAS 2017: 942-945 - [c30]Nitin Pundir, Fathi Amsaad, Muhtadi Choudhury, Mohammed Y. Niamat:
Novel technique to improve strength of weak arbiter PUF. MWSCAS 2017: 1532-1535 - 2016
- [c29]Fathi Amsaad, Atul Prasad, Chayanika Roychaudhuri, Mohammed Y. Niamat:
A novel security technique to generate truly random and highly reliable reconfigurable ROPUF-based cryptographic keys. HOST 2016: 185-190 - 2015
- [c28]Muslim Mustapa, Mohammed Y. Niamat:
Temperature, Voltage, and Aging Effects in Ring Oscillator Physical Unclonable Function. HPCC/CSS/ICESS 2015: 1699-1702 - [c27]Fathi Amsaad, Tamzidul Hoque, Mohammed Y. Niamat:
Analyzing the performance of a configurable ROPUF design controlled by programmable XOR gates. MWSCAS 2015: 1-4 - [c26]Tamzidul Hoque, Muslim Mustapa, Fathi Amsaad, Mohammed Y. Niamat:
Assessment of NAND based ring oscillator for hardware Trojan detection. MWSCAS 2015: 1-4 - 2014
- [c25]Kavya Vittala, Srinivasa Vemuru, Mohammed Y. Niamat:
FPGA interconnect modeling for lifetime failure detection. EIT 2014: 280-283 - [c24]Srinivasa Vemuru, Peng Wang, Mohammed Y. Niamat:
Majority logic gate synthesis approaches for post-CMOS logic circuits: A review. EIT 2014: 284-289 - [c23]Roshan Silwal, Mohammed Y. Niamat:
Asynchronous physical unclonable function using FPGA-based self-timed ring oscillator (abstract only). FPGA 2014: 252 - 2013
- [c22]Muslim Mustapa, Mohammed Y. Niamat, Mansoor Alam, Taylor W. Killian:
Frequency uniqueness in ring oscillator Physical Unclonable Functions on FPGAs. MWSCAS 2013: 465-468 - [c21]Priyanka Gadde, Mohammed Y. Niamat:
FPGA memory testing technique using BIST. MWSCAS 2013: 473-476 - [c20]Roshan Silwal, Mohammed Y. Niamat, Muslim Mustapa:
Asynchronous approach to ring oscillator for FPGA-based Physical Unclonable Function design. MWSCAS 2013: 541-544 - 2012
- [c19]Nagajyothi Gunti, Weiqing Sun, Mingzhe Xu, Zidong Liu, Mohammed Y. Niamat, Mansoor Alam:
A Healthcare Information System with Augmented Access Controls. APWeb 2012: 792-795 - [c18]SaiDeepa Rayaprolu, Srinivasa Vemuru, Mohammed Y. Niamat:
Efficient AFT implementation in FPGAs to detect potential electromigration failures. EIT 2012: 1-6 - [c17]Srinivasa Vemuru, Priyanka Singh, Mohammed Y. Niamat:
Modeling impact of bypass diodes on photovoltaic cell performance under partial shading. EIT 2012: 1-5 - [c16]Swetha Pappala, Mohammed Y. Niamat, Weiqing Sun:
FPGA based key generation technique for anti-counterfeiting methods using Physically Unclonable Functions and artificial intelligence. FPL 2012: 388-393 - [c15]Hemant Balijepalli, Mohammed Y. Niamat:
Design of a novel Quantum-dot Cellular Automata Field Programmable Gate Array. FPL 2012: 611-614 - [c14]Swetha Pappala, Mohammed Y. Niamat, Weiqing Sun:
FPGA based trustworthy authentication technique using Physically Unclonable Functions and artificial intelligence. HOST 2012: 59-62 - [c13]Swetha Pappala, Mohammed Y. Niamat, Weiqing Sun:
FPGA based device specific key generation method using Physically Uncloanble Functions and neural networks. MWSCAS 2012: 330-333 - [c12]Hemant Balijepalli, Mohammed Y. Niamat:
Design of a nanoscale Quantum-dot Cellular Automata Configurable Logic Block for FPGAs. MWSCAS 2012: 622-625 - 2011
- [c11]Priyanka Singh, Mohammed Y. Niamat, Srinivasa Vemuru:
Modeling of Random Shading Effects in Solar Cells. ICSEng 2011: 86-90 - [c10]Saketh Bharadwaja, Weiqing Sun, Mohammed Y. Niamat, Fangyang Shen:
Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection System. ITNG 2011: 695-700 - [c9]Nagajyothi Gunti, Weiqing Sun, Mohammed Y. Niamat:
I-RBAC: Isolation enabled role-based access control. PST 2011: 79-86 - 2010
- [c8]Srinivasa Vemuru, Sravani Kristem, Mohammed Y. Niamat:
Built-In Self-Test Circuit Optimization for Embedded Cores. CDES 2010: 88-92 - [c7]Mohammed Y. Niamat, Tejas Raviraj, Sowmya Panuganti, Srinivasa Vemuru:
Quantum-Dot Cellular Automata Implementation of FPGA Configurable Logic Blocks. CDES 2010: 182-188 - [c6]Mohammed Y. Niamat, Sowmya Panuganti, Tejas Raviraj:
Modeling and simulation of nano quantum FPGAs (abstract only). FPGA 2010: 291 - [c5]Barath Vasudevan, Mohammed Y. Niamat, Mansoor Alam, Srinivasa Vemuru:
Analysis and test of electromigration failures in FPGAs. ISCAS 2010: 3905-3908 - 2006
- [c4]Mohammed Y. Niamat, Dinesh Nemade, Mohsin M. Jamali:
Testing embedded RAM modules in SRAM-based FPGAs. FPGA 2006: 228 - 2005
- [c3]Mohammed Y. Niamat, Aditya Ravinuthala, Mohsin M. Jamali, Srinivasa Vemuru:
BIST for Embedded SRAMs in System on Chips. ESA 2005: 74-80 - [c2]Mohammed Y. Niamat, Surya S. Hejeebu, Mansoor Alam:
A BIST Approach for Testing FPGAs Using JBITS. FCCM 2005: 267-268 - 1994
- [c1]Mohammed Y. Niamat, Mohsin M. Jamali, P. Y. Mohanty:
Design of a Mesh-Type Systolic Array Architecture for the Fast Computation of the Single Linkage Algorithm. ISCAS 1994: 117-120
Parts in Books or Collections
- 2018
- [p2]Fathi Amsaad, Nitin Pundir, Mohammed Y. Niamat:
A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks. Computer and Network Security Essentials 2018: 407-425 - 2014
- [p1]Peng Wang, Mohammed Y. Niamat, Srinivasa Vemuru:
Majority Logic Synthesis Based on Nauty Algorithm. Field-Coupled Nanocomputing 2014: 111-132
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint