Follow
Hasan Al Shaikh
Hasan Al Shaikh
Graduate Research Assistant, University of Florida
Verified email at ufl.edu
Title
Cited by
Cited by
Year
Fuzz, penetration, and ai testing for soc security verification: Challenges and solutions
KZ Azar, MM Hossain, A Vafaei, H Al Shaikh, NN Mondol, F Rahman, ...
Cryptology ePrint Archive, 2022
182022
Electric load forecasting with hourly precision using long short-term memory networks
H Al Shaikh, MA Rahman, A Zubair
2019 International Conference on Electrical, Computer and Communication …, 2019
152019
Sharpen: Soc security verification by hardware penetration test
H Al-Shaikh, A Vafaei, MMM Rahman, KZ Azar, F Rahman, F Farahmandi, ...
Proceedings of the 28th Asia and South Pacific Design Automation Conference …, 2023
82023
Short-Term Electric Demand Forecasting for Power Systems Using Similar Months Approach Based SARIMA
H Al-Shaikh, MA Rahman, A Zubair
2019 IEEE International Conference on Power, Electrical, and Electronics and …, 2019
82019
Benchmarking of soc-level hardware vulnerabilities: A complete walkthrough
S Tarek, H Al Shaikh, SR Rajendran, F Farahmandi
2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 1-6, 2023
52023
Digital twin for secure semiconductor lifecycle management: prospects and applications
HA Shaikh, MB Monjil, S Chen, N Asadizanjani, F Farahmandi, ...
arXiv preprint arXiv:2205.10962, 2022
22022
Quardtropy: Detecting and quantifying unauthorized information leakage in hardware designs using g-entropy
H Al Shaikh, MB Monjil, KZ Azar, F Farahmandi, M Tehranipoor, ...
2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2023
12023
Quantitative Information Flow Analysis of Hardware Designs using Asset Flow Graphs
H Al Shaikh, MB Monjil, KZ Azar, F Farahmandi, M Tehranipoor, ...
GOMACTech, 2023
2023
Cost Function Assisted Fuzz and Penetration Testing for SoC Security Verification
H Al Shaikh, MM Hossain, KZ Azar, F Rahman, F Farahmandi
GOMACTech, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–9