default search action
Shayan Taheri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Md Mahfuz Al Hasan, Mohammad Tahsin Mostafiz, Thomas An Le, Jake Julia, Nidish Vashistha, Shayan Taheri, Navid Asadizanjani:
EVHA: Explainable Vision System for Hardware Testing and Assurance - An Overview. ACM J. Emerg. Technol. Comput. Syst. 19(3): 24:1-24:25 (2023) - 2022
- [j7]Wenwei Zhao, Suprith Gurudu, Shayan Taheri, Shajib Ghosh, Mukhil Azhagan Mallaiyan Sathiaseelan, Navid Asadizanjani:
PCB Component Detection Using Computer Vision for Hardware Assurance. Big Data Cogn. Comput. 6(2): 39 (2022) - [c4]Shajib Ghosh, Mohammad Tahsin Mostafiz, Suprith Gurudu, Shayan Taheri, Navid Asadizanjani:
PCB Component Detection for Hardware Assurance: A Feature Selection-based Approach. HOST 2022: 109-112 - [i6]Wenwei Zhao, Suprith Gurudu, Shayan Taheri, Shajib Ghosh, Mukhil Azhagan Mallaiyan Sathiaseelan, Navid Asadizanjani:
PCB Component Detection using Computer Vision for Hardware Assurance. CoRR abs/2202.08452 (2022) - [i5]Md Mahfuz Al Hasan, Mohammad Tahsin Mostafiz, Thomas An Le, Jake Julia, Nidish Vashistha, Shayan Taheri, Navid Asadizanjani:
EVHA: Explainable Vision System for Hardware Testing and Assurance - An Overview. CoRR abs/2207.09627 (2022) - 2021
- [j6]Mukhil Azhagan Mallaiyan Sathiaseelan, Olivia P. Paradis, Shayan Taheri, Navid Asadizanjani:
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It? Cryptogr. 5(1): 9 (2021) - 2020
- [j5]Shayan Taheri, Aminollah Khormali, Milad Salem, Jiann-Shiun Yuan:
Developing a Robust Defensive System against Adversarial Examples Using Generative Adversarial Networks. Big Data Cogn. Comput. 4(2): 11 (2020)
2010 – 2019
- 2019
- [j4]Shayan Taheri, Milad Salem, Jiann-Shiun Yuan:
RazorNet: Adversarial Training and Noise Training on a Deep Neural Network Fooled by a Shallow Neural Network. Big Data Cogn. Comput. 3(3): 43 (2019) - [j3]Milad Salem, Shayan Taheri, Jiann-Shiun Yuan:
Utilizing Transfer Learning and Homomorphic Encryption in a Privacy Preserving and Secure Biometric Recognition System. Comput. 8(1): 3 (2019) - 2018
- [j2]Milad Salem, Shayan Taheri, Jiann-Shiun Yuan:
An Experimental Evaluation of Fault Diagnosis from Imbalanced and Incomplete Data for Smart Semiconductor Manufacturing. Big Data Cogn. Comput. 2(4): 30 (2018) - [j1]Shayan Taheri, Milad Salem, Jiann-Shiun Yuan:
Leveraging Image Representation of Network Traffic Data and Transfer Learning in Botnet Detection. Big Data Cogn. Comput. 2(4): 37 (2018) - [c3]Milad Salem, Shayan Taheri, Jiann-Shiun Yuan:
ECG Arrhythmia Classification Using Transfer Learning from 2- Dimensional Deep CNN Features. BioCAS 2018: 1-4 - [c2]Milad Salem, Shayan Taheri, Jiann-Shiun Yuan:
Anomaly Generation Using Generative Adversarial Networks in Host-Based Intrusion Detection. UEMCON 2018: 683-687 - [i4]Milad Salem, Shayan Taheri, Jiann-Shiun Yuan:
ECG Arrhythmia Classification Using Transfer Learning from 2-Dimensional Deep CNN Features. CoRR abs/1812.04693 (2018) - [i3]Milad Salem, Shayan Taheri, Jiann-Shiun Yuan:
Anomaly Generation using Generative Adversarial Networks in Host Based Intrusion Detection. CoRR abs/1812.04697 (2018) - 2017
- [c1]Shayan Taheri, Jiann-Shiun Yuan:
Security analysis of computing systems from circuit-architectural perspective. DSC 2017: 166-173 - [i2]Shayan Taheri, Jiann-Shiun Yuan:
Security Analysis of Tunnel Field-Effect Transistor for Low Power Hardware. CoRR abs/1704.07878 (2017) - [i1]Shayan Taheri, Jiann-Shiun Yuan:
Security Protection for Magnetic Tunnel Junction. CoRR abs/1704.08513 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint