Md Tanvir Arafin

Orcid: 0000-0002-5179-5216

According to our database1, Md Tanvir Arafin authored at least 27 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An RRAM-Based Computing-in-Memory Architecture and Its Application in Accelerating Transformer Inference.
IEEE Trans. Very Large Scale Integr. Syst., March, 2024

2023
ADLPT: Improving 3D NAND Flash Memory Reliability by Adaptive Lifetime Prediction Techniques.
IEEE Trans. Computers, June, 2023

2022
An Approximate Memory Based Defense Against Model Inversion Attacks to Neural Networks.
IEEE Trans. Emerg. Top. Comput., 2022

Voltage Over-Scaling-Based Lightweight Authentication for IoT Security.
IEEE Trans. Computers, 2022

Cyber Threat Analysis and Trustworthy Artificial Intelligence.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

Computation-in-Memory Accelerators for Secure Graph Database: Opportunities and Challenges.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022

Approximation on Data Flow Graph Execution for Energy Efficiency.
Proceedings of the Approximate Computing, 2022

Voltage Overscaling Techniques for Security Applications.
Proceedings of the Approximate Computing, 2022

2021
Attack Detection and Countermeasures for Autonomous Navigation.
Proceedings of the 55th Annual Conference on Information Sciences and Systems, 2021

Security of Neural Networks from Hardware Perspective: A Survey and Beyond.
Proceedings of the ASPDAC '21: 26th Asia and South Pacific Design Automation Conference, 2021

RIME: A Scalable and Energy-Efficient Processing-In-Memory Architecture for Floating-Point Operations.
Proceedings of the ASPDAC '21: 26th Asia and South Pacific Design Automation Conference, 2021

2020
FABLE-DTS: Hardware-Software Co-Design of a Fast and Stable Data Transmission System for FPGAs.
Proceedings of the 33rd IEEE International System-on-Chip Conference, 2020

Securing Industrial Control Systems Using Physical Device Fingerprinting.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020

Security Challenges of Processing-In-Memory Systems.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

MIDAS: Model Inversion Defenses Using an Approximate Memory System.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2020

2019
LPN-based Device Authentication Using Resistive Memory.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

2018
Hardware-Based Authentication for the Internet of Things.
PhD thesis, 2018

Memristors for Secret Sharing-Based Lightweight Authentication.
IEEE Trans. Very Large Scale Integr. Syst., 2018

Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks (Extended Version).
CoRR, 2018

Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018

2017
Approximate Computing for Low Power and Security in the Internet of Things.
Computer, 2017

Hardware-based anti-counterfeiting techniques for safeguarding supply chain integrity.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2017

A Low-Cost GPS Spoofing Detector Design for Internet of Things (IoT) Applications.
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017

VOLtA: Voltage over-scaling based lightweight authentication for IoT applications.
Proceedings of the 22nd Asia and South Pacific Design Automation Conference, 2017

2016
Secret Sharing and Multi-user Authentication: From Visual Cryptography to RRAM Circuits.
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 2016

2015
A survey on memristor modeling and security applications.
Proceedings of the Sixteenth International Symposium on Quality Electronic Design, 2015

RRAM Based Lightweight User Authentication.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2015


  Loading...