default search action
Faiq Khalid
Person information
- affiliation: TU Wien, Vienna, Austria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j17]Adewale Adeyemo, Jonathan J. Sanderson, Tolulope A. Odetola, Faiq Khalid, Syed Rafay Hasan:
StAIn: Stealthy Avenues of Attacks on Horizontally Collaborated Convolutional Neural Network Inference and Their Mitigation. IEEE Access 11: 10520-10534 (2023) - [j16]Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique:
SeVuc: A study on the Security Vulnerabilities of Capsule Networks against adversarial attacks. Microprocess. Microsystems 96: 104738 (2023) - [j15]Tolulope A. Odetola, Adewale Adeyemo, Faiq Khalid, Syed Rafay Hasan:
FM-ModComp: Feature Map Modification and Hardware-Software Co-Comparison for secure hardware accelerator-based CNN inference. Microprocess. Microsystems 100: 104827 (2023) - [c38]Enahoro Oriero, Faiq Khalid, Syed Rafay Hasan:
DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans. HASP@MICRO 2023: 47-55 - [i21]Mahya Morid Ahmadi, Faiq Khalid, Radha Vaidya, Florian Kriebel, Andreas Steininger, Muhammad Shafique:
SHIELD: An Adaptive and Lightweight Defense against the Remote Power Side-Channel Attacks on Multi-tenant FPGAs. CoRR abs/2303.06486 (2023) - [i20]Enahoro Oriero, Faiq Khalid, Syed Rafay Hasan:
DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans. CoRR abs/2310.03994 (2023) - 2022
- [j14]Tolulope A. Odetola, Katie M. Groves, Muhammed Yousufuddin, Faiq Khalid, Syed Rafay Hasan:
2L-3W: 2-Level 3-Way Hardware-Software Co-verification for the Mapping of Convolutional Neural Network (CNN) onto FPGA Boards. SN Comput. Sci. 3(1): 60 (2022) - [j13]Faiq Khalid, Imran Hafeez Abbassi, Semeen Rehman, Awais Mehmood Kamboh, Osman Hasan, Muhammad Shafique:
ForASec: Formal Analysis of Hardware Trojan-Based Security Vulnerabilities in Sequential Circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(4): 1167-1180 (2022) - [c37]Tolulope A. Odetola, Faiq Khalid, Syed Rafay Hasan:
LaBaNI: Layer-based Noise Injection Attack on Convolutional Neural Networks. ACM Great Lakes Symposium on VLSI 2022: 143-146 - 2021
- [j12]Tolulope A. Odetola, Faiq Khalid, Hawzhin Mohammed, Travis Sandefur, Syed Rafay Hasan:
FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack. IEEE Access 9: 115370-115387 (2021) - [c36]Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani H. Saleh, Muhammad Shafique, Ozgur Sinanoglu:
GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking. DATE 2021: 780-785 - [c35]Hawzhin Mohammed, Faiq Khalid, Paul Sawyer, Gabriella Cataloni, Syed Rafay Hasan:
InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device(s) in IoT for Hardware Trojan Detection. HASP@MICRO 2021: 8:1-8:8 - [c34]Adewale Adeyemo, Faiq Khalid, Tolulope A. Odetola, Syed Rafay Hasan:
Security Analysis of Capsule Network Inference using Horizontal Collaboration. MWSCAS 2021: 1074-1077 - [i19]Faiq Khalid, Muhammad Abdullah Hanif, Muhammad Shafique:
Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks. CoRR abs/2105.03251 (2021) - [i18]Tolulope A. Odetola, Faiq Khalid, Travis Sandefur, Hawzhin Mohammed, Syed Rafay Hasan:
FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack. CoRR abs/2106.06895 (2021) - [i17]Mahya Morid Ahmadi, Faiq Khalid, Muhammad Shafique:
Side-Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities. CoRR abs/2106.08877 (2021) - [i16]Adewale Adeyemo, Faiq Khalid, Tolulope A. Odetola, Syed Rafay Hasan:
Security Analysis of Capsule Network Inference using Horizontal Collaboration. CoRR abs/2109.11041 (2021) - 2020
- [j11]Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Rehan Ahmed, Semeen Rehman:
SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters. IEEE Des. Test 37(2): 58-65 (2020) - [j10]Faiq Khalid, Syed Rafay Hasan, Osman Hasan, Muhammad Shafique:
SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection. Microprocess. Microsystems 77: 103122 (2020) - [j9]Syed Ali Asadullah Bukhari, Faiq Khalid, Osman Hasan, Muhammad Shafique, Jörg Henkel:
Toward Model Checking-Driven Fair Comparison of Dynamic Thermal Management Techniques Under Multithreaded Workloads. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(8): 1725-1738 (2020) - [j8]Faiq Khalid, Syed Rafay Hasan, Sara Zia, Osman Hasan, Falah Awwad, Muhammad Shafique:
MacLeR: Machine Learning-Based Runtime Hardware Trojan Detection in Resource-Constrained IoT Edge Devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3748-3761 (2020) - [c33]Mahum Naseer, Mishal Fatima Minhas, Faiq Khalid, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique:
FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks. DATE 2020: 666-669 - [c32]Faiq Khalid, Hassan Ali, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique:
FaDec: A Fast Decision-based Attack for Adversarial Machine Learning. IJCNN 2020: 1-8 - [c31]Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique:
Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks. IJCNN 2020: 1-8 - [i15]Faiq Khalid, Syed Rafay Hasan, Sara Zia, Osman Hasan, Falah Awwad, Muhammad Shafique:
MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices. CoRR abs/2011.11632 (2020) - [i14]Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani H. Saleh, Muhammad Shafique, Ozgur Sinanoglu:
GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking. CoRR abs/2012.05948 (2020)
2010 – 2019
- 2019
- [j7]Denise Ratasich, Faiq Khalid, Florian Geissler, Radu Grosu, Muhammad Shafique, Ezio Bartocci:
A Roadmap Toward the Resilient Internet of Things for Cyber-Physical Systems. IEEE Access 7: 13260-13283 (2019) - [j6]Imran Hafeez Abbassi, Faiq Khalid, Osman Hasan, Awais Mehmood Kamboh:
Using gate-level side channel parameters for formally analyzing vulnerabilities in integrated circuits. Sci. Comput. Program. 171: 42-66 (2019) - [c30]Muhammad Abdullah Hanif, Faiq Khalid, Muhammad Shafique:
CANN: Curable Approximations for High-Performance Deep Neural Network Accelerators. DAC 2019: 6 - [c29]Jeff Jun Zhang, Kang Liu, Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Theocharis Theocharides, Alessandro Artussi, Muhammad Shafique, Siddharth Garg:
Building Robust Machine Learning Systems: Current Progress, Research Challenges, and Opportunities. DAC 2019: 175 - [c28]Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique:
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning. DATE 2019: 902-907 - [c27]Imran Hafeez Abbassi, Faiq Khalid, Semeen Rehman, Awais Mehmood Kamboh, Axel Jantsch, Siddharth Garg, Muhammad Shafique:
TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint. DATE 2019: 914-919 - [c26]Faiq Khalid, Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique:
QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks. IOLTS 2019: 182-187 - [c25]Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique:
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks. IOLTS 2019: 188-193 - [c24]Alberto Marchisio, Muhammad Abdullah Hanif, Faiq Khalid, George Plastiras, Christos Kyrkou, Theocharis Theocharides, Muhammad Shafique:
Deep Learning for Edge Computing: Current Trends, Cross-Layer Optimizations, and Open Research Challenges. ISVLSI 2019: 553-559 - [c23]Muluken Hailesellasie, Jacob Nelson, Faiq Khalid, Syed Rafay Hasan:
VAWS: Vulnerability Analysis of Neural Networks using Weight Sensitivity. MWSCAS 2019: 650-653 - [i13]Faiq Khalid, Syed Rafay Hasan, Osman Hasan, Falah Awwad, Muhammad Shafique:
SIMCom: Statistical Sniffing of Inter-Module Communications for Run-time Hardware Trojan Detection. CoRR abs/1901.07299 (2019) - [i12]Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique:
CapsAttacks: Robust and Imperceptible Adversarial Attacks on Capsule Networks. CoRR abs/1901.09878 (2019) - [i11]Faiq Khalid, Hassan Ali, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique:
RED-Attack: Resource Efficient Decision based Attack for Machine Learning. CoRR abs/1901.10258 (2019) - [i10]Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique:
SNN under Attack: are Spiking Deep Belief Networks vulnerable to Adversarial Examples? CoRR abs/1902.01147 (2019) - [i9]Mahum Naseer, Mishal Fatima Minhas, Faiq Khalid, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique:
FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks. CoRR abs/1912.01978 (2019) - 2018
- [j5]Imran Hafeez Abbassi, Faiq Khalid, Osman Hasan, Awais Mehmood Kamboh, Muhammad Shafique:
McSeVIC: A Model Checking Based Framework for Security Vulnerability Analysis of Integrated Circuits. IEEE Access 6: 32240-32257 (2018) - [j4]Faiq Khalid, Syed Rafay Hasan, Osman Hasan, Falah R. Awwad:
Runtime hardware Trojan monitors through modeling burst mode communication using formal verification. Integr. 61: 62-76 (2018) - [c22]Muhammad Shafique, Theocharis Theocharides, Christos-Savvas Bouganis, Muhammad Abdullah Hanif, Faiq Khalid, Rehan Hafiz, Semeen Rehman:
An overview of next-generation architectures for machine learning: Roadmap, opportunities and challenges in the IoT era. DATE 2018: 827-832 - [c21]Muhammad Shafique, Faiq Khalid, Semeen Rehman:
Intelligent Security Measures for Smart Cyber Physical Systems. DSD 2018: 280-287 - [c20]Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique:
Security for Machine Learning-Based Systems: Attacks and Challenges During Training and Inference. FIT 2018: 327-332 - [c19]Semeen Rehman, Florian Kriebel, Bharath Srinivas Prabakaran, Faiq Khalid, Muhammad Shafique:
Hardware and Software Techniques for Heterogeneous Fault-Tolerance. IOLTS 2018: 115-118 - [c18]Muhammad Abdullah Hanif, Faiq Khalid, Rachmad Vidya Wicaksana Putra, Semeen Rehman, Muhammad Shafique:
Robust Machine Learning Systems: Reliability and Security for Deep Neural Networks. IOLTS 2018: 257-260 - [c17]Muluken Hailesellasie, Syed Rafay Hasan, Faiq Khalid, Falah Awwad, Muhammad Shafique:
FPGA-Based Convolutional Neural Network Architecture with Reduced Parameter Requirements. ISCAS 2018: 1-5 - [c16]Faiq Khalid, Sunil Nanjiani, Syed Rafay Hasan, Osman Hasan, Falah R. Awwad, Muhammad Shafique:
Low Power Digital Clock Multipliers for Battery-Operated Internet of Things (IoT) Devices. ISCAS 2018: 1-5 - [c15]Florian Kriebel, Semeen Rehman, Muhammad Abdullah Hanif, Faiq Khalid, Muhammad Shafique:
Robustness for Smart Cyber Physical Systems and Internet-of-Things: From Adaptive Robustness Methods to Reliability and Security for Machine Learning. ISVLSI 2018: 581-586 - [c14]Hawzhin Mohammed, Jimmy Howell, Syed Rafay Hasan, Nan Guo, Faiq Khalid, Omar S. Elkeelany:
Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup. MWSCAS 2018: 972-975 - [c13]Shahid Khan, Faiq Khalid, Osman Hasan, João M. P. Cardoso:
Formal verification of a domain specific language for run-time adaptation. SysCon 2018: 1-8 - [i8]Denise Ratasich, Faiq Khalid, Florian Geissler, Radu Grosu, Muhammad Shafique, Ezio Bartocci:
A Roadmap Towards Resilient Internet of Things for Cyber-Physical Systems. CoRR abs/1810.06870 (2018) - [i7]Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique:
ISA4ML: Training Data-Unaware Imperceptible Security Attacks on Machine Learning Modules of Autonomous Vehicles. CoRR abs/1811.01031 (2018) - [i6]Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Faiq Khalid, Semeen Rehman, Rehan Ahmed, Muhammad Shafique:
QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks. CoRR abs/1811.01437 (2018) - [i5]Hammad Tariq, Hassan Ali, Muhammad Abdullah Hanif, Faiq Khalid, Semeen Rehman, Rehan Ahmed, Muhammad Shafique:
SSCNets: A Selective Sobel Convolution-based Technique to Enhance the Robustness of Deep Neural Networks against Security Attacks. CoRR abs/1811.01443 (2018) - [i4]Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique:
FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning. CoRR abs/1811.01444 (2018) - [i3]Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique:
Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference. CoRR abs/1811.01463 (2018) - [i2]Imran Hafeez Abbassi, Faiq Khalid, Semeen Rehman, Awais Mehmood Kamboh, Axel Jantsch, Siddharth Garg, Muhammad Shafique:
TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint. CoRR abs/1812.02770 (2018) - [i1]Faiq Khalid, Imran Hafeez Abbassi, Semeen Rehman, Osman Hasan, Muhammad Shafique:
ForASec: Formal Analysis of Security Vulnerabilities in Sequential Circuits. CoRR abs/1812.05446 (2018) - 2017
- [j3]Syed Ali Asadullah Bukhari, Faiq Khalid Lodhi, Osman Hasan, Muhammad Shafique, Jörg Henkel:
FAMe-TM: Formal analysis methodology for task migration algorithms in Many-Core systems. Sci. Comput. Program. 133: 154-174 (2017) - [c12]Faiq Khalid Lodhi, Syed Rafay Hasan, Osman Hasan, Falah R. Awwad:
Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models. DATE 2017: 294-297 - [c11]Syed Ali Asadullah Bukhari, Faiq Khalid Lodhi, Osman Hasan, Muhammad Shafique, Jörg Henkel:
CAnDy-TM: Comparative analysis of dynamic thermal management in many-cores using model checking. DATE 2017: 1289-1292 - [c10]Faiq Khalid, Syed Rafay Hasan, Osman Hasan, Falah Awwad:
Behavior profiling of power distribution networks for runtime hardware trojan detection. MWSCAS 2017: 1316-1319 - 2016
- [j2]Faiq Khalid Lodhi, Syed Rafay Hasan, Osman Hasan, Falah R. Awwad:
Analyzing Vulnerability of Asynchronous Pipeline to Soft Errors: Leveraging Formal Verification. J. Electron. Test. 32(5): 569-586 (2016) - [c9]Imran Hafeez Abbasi, Faiq Khalid Lodhi, Awais Mehmood Kamboh, Osman Hasan:
Formal Verification of Gate-Level Multiple Side Channel Parameters to Detect Hardware Trojans. FTSCS 2016: 75-92 - [c8]Faiq Khalid Lodhi, Imran Hafeez Abbasi, Faiq Khalid, Osman Hasan, Falah R. Awwad, Syed Rafay Hasan:
A self-learning framework to detect the intruded integrated circuits. ISCAS 2016: 1702-1705 - [c7]Faiq Khalid Lodhi, Imran Hafeez Abbasi, Faiq Khalid, Osman Hasan, Falah R. Awwad, Syed Rafay Hasan:
A self-learning framework to detect the intruded integrated circuits. ISCAS 2016: 1702-1705 - [c6]Waqas Gul, Syed Rafay Hasan, Osman Hasan, Faiq Khalid Lodhi, Falah R. Awwad:
Synchronously triggered GALS design templates leveraging QDI asynchronous interfaces. ISCAS 2016: 2615-2618 - 2015
- [c5]Faiq Khalid Lodhi, Syed Rafay Hasan, Osman Hasan, Falah R. Awwad:
Formal analysis of macro synchronous micro asychronous pipeline for hardware Trojan detection. NORCAS 2015: 1-4 - 2014
- [j1]Faiq Khalid Lodhi, Syed Rafay Hasan, Naeha Sharif, Nadra Ramzan, Osman Hasan:
Timing variation aware dynamic digital phase detector for low-latency clock domain crossing. IET Circuits Devices Syst. 8(1): 58-64 (2014) - [c4]Syed Ali Asadullah Bukhari, Faiq Khalid Lodhi, Osman Hasan, Muhammad Shafique, Jörg Henkel:
Formal Verification of Distributed Task Migration for Thermal Management in On-Chip Multi-core Systems Using nuXmv. FTSCS 2014: 32-46 - [c3]Faiq Khalid Lodhi, Syed Rafay Hasan, Osman Hasan, Falah R. Awwad:
Low Power Soft Error Tolerant Macro Synchronous Micro Asynchronous (MSMA) Pipeline. ISVLSI 2014: 601-606 - [c2]Faiq Khalid Lodhi, Syed Rafay Hasan, Osman Hasan, Falah Awwad:
Hardware Trojan detection in soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline. MWSCAS 2014: 659-662 - 2012
- [c1]Faiq Khalid Lodhi, Osman Hasan, Syed Rafay Hasan, Falah Awwad:
Modified null convention logic pipeline to detect soft errors in both null and data phases. MWSCAS 2012: 402-405
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint