Skip to content

Latest commit

 

History

History
20 lines (18 loc) · 2.29 KB

README.md

File metadata and controls

20 lines (18 loc) · 2.29 KB

Sean (Shayan) Taheri's Publications

This repository provides information about my publications:

1. Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?: https://www.mdpi.com/2410-387X/5/1/9.

2. Developing a Robust Defensive System against Adversarial Examples Using Generative Adversarial Networks: https://www.mdpi.com/2504-2289/4/2/11; and https://github.com/shayan-taheri/AEG_Pix2Pix.

3. RazorNet: Adversarial Training and Noise Training on a Deep Neural Network Fooled by a Shallow Neural Network: https://www.mdpi.com/2504-2289/3/3/43.

4. Utilizing Transfer Learning and Homomorphic Encryption in a Privacy Preserving and Secure Biometric Recognition System: https://www.mdpi.com/2073-431X/8/1/3.

5. Anomaly Generation using Generative Adversarial Networks in Host Based Intrusion Detection: https://arxiv.org/abs/1812.04697.

6. Leveraging Image Representation of Network Traffic Data and Transfer Learning in Botnet Detection: https://www.mdpi.com/2504-2289/2/4/37.

7. ECG Arrhythmia Classification Using Transfer Learning from 2-Dimensional Deep CNN Features: https://ieeexplore.ieee.org/abstract/document/8584808/.

8. An Experimental Evaluation of Fault Diagnosis from Imbalanced and Incomplete Data for Smart Semiconductor Manufacturing: https://www.mdpi.com/2504-2289/2/4/30.

9. A Cross-Layer Biometric Recognition System for Mobile IoT Devices: https://www.mdpi.com/2079-9292/7/2/26.

10. Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things: https://www.mdpi.com/2079-9292/6/3/67.

11. Mixed-Signal Hardware Security: Attacks and Countermeasures for ΔΣ ADC: https://www.mdpi.com/2079-9292/6/3/60.

12. Security analysis of computing systems from circuit-architectural perspective: https://ieeexplore.ieee.org/abstract/document/8073843/.

13. Security Protection for Magnetic Tunnel Junction: https://arxiv.org/abs/1704.08513.

14. Security Analysis of Tunnel Field-Effect Transistor for Low Power Hardware: https://arxiv.org/abs/1704.07878.

15. Security interrogation and defense for SAR analog to digital converter: https://www.mdpi.com/2079-9292/6/2/48.

16. Evaluation of Tracking Regimes for, and Security of, PLI Systems: https://digitalcommons.usu.edu/etd/4549/.