default search action
Jaya Dofe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j12]Jaya Dofe, Shailesh Rajput:
Protecting against modeling attacks: design and analysis of lightweight dynamic physical unclonable function. Clust. Comput. 28(1): 6 (2025) - 2024
- [j11]Jaya Dofe, Wafi Danesh, Vaishnavi More, Aaditya Chaudhari:
Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs. Cryptogr. 8(3): 36 (2024) - [c24]Mariam Mousa, Jaya Dofe:
Enhancing NFC/RFID System Security through Accelerometer-Generated Dynamic Keys. EuCNC/6G Summit 2024: 842-847 - [c23]Vaishnavi More, Aaditya Chaudhari, Barnaboss Puli, Vasavi Vuppala, Jaya Dofe, Wafi Danesh:
Natural Language Processing Meets Hardware Trojan Detection: Automating Security of FPGAs. ISVLSI 2024: 775-778 - 2023
- [j10]Jaya Dofe, Kriti Rai Saini:
Internet of Things World: A New Security Perspective. SN Comput. Sci. 4(1): 36 (2023) - [c22]Shailesh Rajput, Jaya Dofe:
Counteracting Modeling Attacks Using Hardware-Based Dynamic Physical Unclonable Function. CSR 2023: 586-591 - [c21]Shailesh Rajput, Jaya Dofe:
Secure Dynamic PUF for IoT Security. IFIPIoT (1) 2023: 454-462 - [c20]Shailesh Rajput, Jaya Dofe, Wafi Danesh:
Automating Hardware Trojan Detection Using Unsupervised Learning: A Case Study of FPGA. ISQED 2023: 1-6 - [c19]Jaya Dofe:
Keynote Speech 3: Exploring the Synergy of 3D Integration and Hardware Security. MCNA 2023: 3 - 2022
- [c18]Kriti Rai Saini, Vinayak Jigajinni, Jaya Dofe:
Performance Comparison of Cryptosystems in Context to Internet of Things. ICDIS 2022: 82-87 - [c17]Jaya Dofe:
Thermal Side-channel Leakage Protection in Monolithic Three Dimensional Integrated Circuits. SOCC 2022: 1-2 - 2021
- [j9]Maulin Raval, Shubhendu Bhardwaj, Aparna Aravelli, Jaya Dofe, Hardik A. Gohel:
Smart energy optimization for massive IoT using artificial intelligence. Internet Things 13: 100354 (2021) - [c16]Jaya Dofe, Aaron Nguyen, Andy Nguyen:
Unified Countermeasures against Physical Attacks in Internet of Things - A survey. iSES 2021: 194-199 - [c15]Jaya Dofe, Wafi Danesh:
LC-Physical Unclonable Function in Wireless 3D IC for Securing Internet of Things Devices. SoCC 2021: 67-70 - 2020
- [j8]Zhiming Zhang, Jaya Dofe, Qiaoyan Yu:
Improving power analysis attack resistance using intrinsic noise in 3D ICs. Integr. 73: 30-42 (2020) - [j7]Zhiming Zhang, Jaya Dofe, Pruthvy Yellu, Qiaoyan Yu:
Comprehensive Analysis on Hardware Trojans in 3D ICs: Characterization and Experimental Impact Assessment. SN Comput. Sci. 1(4): 233 (2020)
2010 – 2019
- 2019
- [j6]Lake Bu, Jaya Dofe, Qiaoyan Yu, Michel A. Kinsy:
SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems. J. Hardw. Syst. Secur. 3(3): 200-218 (2019) - 2018
- [j5]Jaya Dofe, Qiaoyan Yu:
Novel Dynamic State-Deflection Method for Gate-Level Design Obfuscation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(2): 273-285 (2018) - [j4]Chen Yan, Jaya Dofe, Scott Kontak, Qiaoyan Yu, Emre Salman:
Hardware-Efficient Logic Camouflaging for Monolithic 3-D ICs. IEEE Trans. Circuits Syst. II Express Briefs 65-II(6): 799-803 (2018) - [c14]Jaya Dofe, Qiaoyan Yu:
Exploiting PDN noise to thwart correlation power analysis attacks in 3D ICs. SLIP@DAC 2018: 6:1-6:6 - [c13]Qiaoyan Yu, Zhiming Zhang, Jaya Dofe:
Investigating Reliability and Security of Integrated Circuits and Systems. ISVLSI 2018: 106-111 - 2017
- [c12]Jaya Dofe, Peng Gu, Dylan C. Stow, Qiaoyan Yu, Eren Kursun, Yuan Xie:
Security Threats and Countermeasures in Three-Dimensional Integrated Circuits. ACM Great Lakes Symposium on VLSI 2017: 321-326 - [c11]Jaya Dofe, Zhiming Zhang, Qiaoyan Yu, Chen Yan, Emre Salman:
Impact of Power Distribution Network on Power Analysis Attacks in Three-Dimensional Integrated Circuits. ACM Great Lakes Symposium on VLSI 2017: 327-332 - [c10]Sean Kramer, Zhiming Zhang, Jaya Dofe, Qiaoyan Yu:
Mitigating Control Flow Attacks in Embedded Systems with Novel Built-in Secure Register Bank. ACM Great Lakes Symposium on VLSI 2017: 483-486 - [c9]Jaya Dofe, Qiaoyan Yu:
Analyzing security vulnerabilities of three-dimensional integrated circuits. HOST 2017: 156 - [c8]Qiaoyan Yu, Jaya Dofe, Zhiming Zhang:
Exploiting hardware obfuscation methods to prevent and detect hardware Trojans. MWSCAS 2017: 819-822 - 2016
- [j3]Jaya Dofe, Hoda Pahlevanzadeh, Qiaoyan Yu:
A Comprehensive FPGA-Based Assessment on Fault-Resistant AES against Correlation Power Analysis Attack. J. Electron. Test. 32(5): 611-624 (2016) - [c7]Hoda Pahlevanzadeh, Jaya Dofe, Qiaoyan Yu:
Assessing CPA resistance of AES with different fault tolerance mechanisms. ASP-DAC 2016: 661-666 - [c6]Jaya Dofe, Qiaoyan Yu, Hailang Wang, Emre Salman:
Hardware Security Threats and Potential Countermeasures in Emerging 3D ICs. ACM Great Lakes Symposium on VLSI 2016: 69-74 - [c5]Jaya Dofe, Chen Yan, Scott Kontak, Emre Salman, Qiaoyan Yu:
Transistor-level camouflaged logic locking method for monolithic 3D IC security. AsianHOST 2016: 1-6 - [c4]Jaya Dofe, Jonathan Frey, Qiaoyan Yu:
Hardware security assurance in emerging IoT applications. ISCAS 2016: 2050-2053 - [c3]Jaya Dofe, Yuejun Zhang, Qiaoyan Yu:
DSD: A Dynamic State-Deflection Method for Gate-Level Netlist Obfuscation. ISVLSI 2016: 565-570 - 2015
- [j2]Jaya Dofe, Jonathan Frey, Hoda Pahlevanzadeh, Qiaoyan Yu:
Strengthening SIMON Implementation Against Intelligent Fault Attacks. IEEE Embed. Syst. Lett. 7(4): 113-116 (2015) - [c2]Jaya Dofe, Connor Reed, Ning Zhang, Qiaoyan Yu:
Fault-tolerant methods for a new lightweight cipher SIMON. ISQED 2015: 460-464 - [c1]Jaya Dofe, Jonathan Frey, Patrick Nsengiyumva, Qiaoyan Yu:
Investigating power characteristics of memristor-based logic gates and their applications in a security primitive. MWSCAS 2015: 1-4 - 2014
- [j1]Wafi Danesh, Jaya Dofe, Qiaoyan Yu:
Efficient Hardware Trojan Detection with Differential Cascade Voltage Switch Logic. VLSI Design 2014: 652187:1-652187:11 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint