Yousra Al-Kabani

Orcid: 0000-0001-8806-8146

According to our database1, Yousra Al-Kabani authored at least 37 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhancing the Accuracy of CSI-Based Positioning in Massive MIMO Systems.
Proceedings of the IEEE International Black Sea Conference on Communications and Networking, 2023

2022
A Deep Neural Network Accelerator using Residue Arithmetic in a Hybrid Optoelectronic System.
ACM J. Emerg. Technol. Comput. Syst., 2022

Privacy Guarantees for Cloud-based State Estimation using Partially Homomorphic Encryption.
Proceedings of the European Control Conference, 2022

2021
Toward Energy-Quality Scaling in Deep Neural Networks.
IEEE Des. Test, 2021

ReCPE: A PE for Reconfigurable Lightweight Cryptography.
Proceedings of the 34th IEEE International System-on-Chip Conference, 2021

2020
ROC: A Reconfigurable Optical Computer for Simulating Physical Processes.
ACM Trans. Parallel Comput., 2020

DNNARA: A Deep Neural Network Accelerator using Residue Arithmetic and Integrated Photonics.
Proceedings of the ICPP 2020: 49th International Conference on Parallel Processing, 2020

2019
A Winograd-based Integrated Photonics Accelerator for Convolutional Neural Networks.
CoRR, 2019

Integrated Photonics Architectures for Residue Number System Computations.
Proceedings of the 2019 IEEE International Conference on Rebooting Computing, 2019

Photonic Processor for Fully Discretized Neural Networks.
Proceedings of the 30th IEEE International Conference on Application-specific Systems, 2019

2018
PCNNA: A Photonic Convolutional Neural Network Accelerator.
Proceedings of the 31st IEEE International System-on-Chip Conference, 2018

2017
Dynamic FPGA Detection and Protection of Hardware Trojan: A Comparative Analysis.
CoRR, 2017

2016
FusedCache: A Naturally Inclusive, Racetrack Memory, Dual-Level Private Cache.
IEEE Trans. Multi Scale Comput. Syst., 2016

Write Pulse Scaling for Energy Efficient STT-MRAM.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016

Hardware security and split fabrication.
Proceedings of the 11th International Design & Test Symposium, 2016

A virtual memory architecture to enhance STT-RAM performance as main memory.
Proceedings of the 2016 IEEE Canadian Conference on Electrical and Computer Engineering, 2016

2015
On kernel acceleration of electromagnetic solvers via hardware emulation.
Comput. Electr. Eng., 2015

On hardware solution of dense linear systems via Gauss-Jordan Elimination.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2015

Homomorphic Data Isolation for Hardware Trojan Protection.
Proceedings of the 2015 IEEE Computer Society Annual Symposium on VLSI, 2015

Finite element emulation-based solver for electromagnetic computations.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Accelerating electromagnetic simulations: A hardware emulation approach.
Proceedings of the 2015 IEEE International Conference on Electronics, 2015

Swarm Robotics Obstacle Avoidance: A Progressive Minimal Criteria Novelty Search-Based Approach.
Proceedings of the Progress in Artificial Intelligence, 2015

2014
E-Voting Attacks and Countermeasures.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

2013
Hardware Trojan Protection for Third Party IPs.
Proceedings of the 2013 Euromicro Conference on Digital System Design, 2013

2012
Trojan Immune Circuits Using Duality.
Proceedings of the 15th Euromicro Conference on Digital System Design, 2012

2010
A Unified Submodular Framework for Multimodal IC Trojan Detection.
Proceedings of the Information Hiding - 12th International Conference, 2010

Provably Secure Obfuscation of Diverse Watermarks for Sequential Circuits.
Proceedings of the HOST 2010, 2010

Real time emulations: foundation and applications.
Proceedings of the 47th Design Automation Conference, 2010

2009
N-version temperature-aware scheduling and binding.
Proceedings of the 2009 International Symposium on Low Power Electronics and Design, 2009

Consistency-based characterization for IC Trojan detection.
Proceedings of the 2009 International Conference on Computer-Aided Design, 2009

2008
Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Designer's Hardware Trojan Horse.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

Input vector control for post-silicon leakage current minimization in the presence of manufacturing variability.
Proceedings of the 45th Design Automation Conference, 2008

N-variant IC design: methodology and applications.
Proceedings of the 45th Design Automation Conference, 2008

Active control and digital rights management of integrated circuit IP cores.
Proceedings of the 2008 International Conference on Compilers, 2008

2007
Active Hardware Metering for Intellectual Property Protection and Security.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Remote activation of ICs for piracy prevention and digital right management.
Proceedings of the 2007 International Conference on Computer-Aided Design, 2007


  Loading...