default search action
Yousra Al-Kabani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c30]Ali Nada, Hazem Ismail Ali, Liang Liu, Yousra Alkabani:
Enhancing the Accuracy of CSI-Based Positioning in Massive MIMO Systems. BlackSeaCom 2023: 90-95 - 2022
- [j5]Jiaxin Peng, Yousra Alkabani, Krunal Puri, Xiaoxuan Ma, Volker J. Sorger, Tarek A. El-Ghazawi:
A Deep Neural Network Accelerator using Residue Arithmetic in a Hybrid Optoelectronic System. ACM J. Emerg. Technol. Comput. Syst. 18(4): 81:1-81:26 (2022) - [c29]Sawsan Emad, Amr Alanwar, Yousra Alkabani, M. Watheq El-Kharashi, Henrik Sandberg, Karl Henrik Johansson:
Privacy Guarantees for Cloud-based State Estimation using Partially Homomorphic Encryption. ECC 2022: 98-105 - 2021
- [j4]Jeff Anderson, Yousra Alkabani, Tarek A. El-Ghazawi:
Toward Energy-Quality Scaling in Deep Neural Networks. IEEE Des. Test 38(4): 27-36 (2021) - [c28]Jeff Anderson, Yousra Alkabani, Tarek A. El-Ghazawi:
ReCPE: A PE for Reconfigurable Lightweight Cryptography. SoCC 2021: 176-181 - [i5]Sawsan Emad, Amr Alanwar, Yousra Alkabani, M. Watheq El-Kharashi, Henrik Sandberg, Karl Henrik Johansson:
Privacy Guarantees for Cloud-based State Estimation using Partially Homomorphic Encryption. CoRR abs/2111.04818 (2021) - 2020
- [j3]Jeff Anderson, Engin Kayraklioglu, Shuai Sun, Joseph Crandall, Yousra Al-Kabani, Vikram K. Narayana, Volker J. Sorger, Tarek A. El-Ghazawi:
ROC: A Reconfigurable Optical Computer for Simulating Physical Processes. ACM Trans. Parallel Comput. 7(1): 8:1-8:29 (2020) - [c27]Jiaxin Peng, Yousra Al-Kabani, Shuai Sun, Volker J. Sorger, Tarek A. El-Ghazawi:
DNNARA: A Deep Neural Network Accelerator using Residue Arithmetic and Integrated Photonics. ICPP 2020: 61:1-61:11
2010 – 2019
- 2019
- [c26]Jeff Anderson, Shuai Sun, Yousra Al-Kabani, Volker J. Sorger, Tarek A. El-Ghazawi:
Photonic Processor for Fully Discretized Neural Networks. ASAP 2019: 25-32 - [c25]Jiaxin Peng, Yousra Al-Kabani, Shuai Sun, Volker J. Sorger, Tarek A. El-Ghazawi:
Integrated Photonics Architectures for Residue Number System Computations. ICRC 2019: 129-137 - [i4]Armin Mehrabian, Mario Miscuglio, Yousra Al-Kabani, Volker J. Sorger, Tarek A. El-Ghazawi:
A Winograd-based Integrated Photonics Accelerator for Convolutional Neural Networks. CoRR abs/1906.10487 (2019) - 2018
- [c24]Armin Mehrabian, Yousra Al-Kabani, Volker J. Sorger, Tarek A. El-Ghazawi:
PCNNA: A Photonic Convolutional Neural Network Accelerator. SoCC 2018: 169-173 - [i3]Armin Mehrabian, Yousra Al-Kabani, Volker J. Sorger, Tarek A. El-Ghazawi:
PCNNA: A Photonic Convolutional Neural Network Accelerator. CoRR abs/1807.08792 (2018) - 2017
- [i2]Amr Al-Anwar, Mona A. Aboelnaga, Yousra Alkabani, M. Watheq El-Kharashi, Hassan Bedour:
Dynamic FPGA Detection and Protection of Hardware Trojan: A Comparative Analysis. CoRR abs/1711.01010 (2017) - 2016
- [j2]Haifeng Xu, Yousra Alkabani, Rami G. Melhem, Alex K. Jones:
FusedCache: A Naturally Inclusive, Racetrack Memory, Dual-Level Private Cache. IEEE Trans. Multi Scale Comput. Syst. 2(2): 69-82 (2016) - [c23]Mohammad A. Ewais, Mohamed A. Omran, Andrew Raafat, Yousra Alkabani:
A virtual memory architecture to enhance STT-RAM performance as main memory. CCECE 2016: 1-6 - [c22]Yousra Alkabani:
Hardware security and split fabrication. IDT 2016: 59-64 - [c21]Yousra Alkabani, Zach Koopmans, Haifeng Xu, Alex K. Jones, Rami G. Melhem:
Write Pulse Scaling for Energy Efficient STT-MRAM. ISVLSI 2016: 248-253 - 2015
- [j1]M. Tarek Ibn Ziad, Mohamed Hossam, Mohamad A. Masoud, Mohamed Nagy, Hesham A. Adel, Yousra Alkabani, M. Watheq El-Kharashi, Khaled Salah, Mohamed Abdel Salam:
On kernel acceleration of electromagnetic solvers via hardware emulation. Comput. Electr. Eng. 47: 96-113 (2015) - [c20]Nesma M. Rezk, Yousra Alkabani, Hassan Bedour, Sherif Hammad:
Swarm Robotics Obstacle Avoidance: A Progressive Minimal Criteria Novelty Search-Based Approach. EPIA 2015: 493-498 - [c19]M. Tarek Ibn Ziad, Yousra Alkabani, M. Watheq El-Kharashi, Khaled Salah, Mohamed Abdelsalam:
Accelerating electromagnetic simulations: A hardware emulation approach. ICECS 2015: 592-595 - [c18]M. Tarek Ibn Ziad, Mohamed Hossam, Mohamad A. Masoud, Mohamed Nagy, Hesham A. Adel, Yousra Alkabani, M. Watheq El-Kharashi, Khaled Salah, Mohamed Abdel Salam:
Finite element emulation-based solver for electromagnetic computations. ISCAS 2015: 1434-1437 - [c17]M. Tarek Ibn Ziad, Amr Al-Anwar, Yousra Alkabani, M. Watheq El-Kharashi, Hassan Bedour:
Homomorphic Data Isolation for Hardware Trojan Protection. ISVLSI 2015: 131-136 - [c16]M. Tarek Ibn Ziad, Yousra Alkabani, M. Watheq El-Kharashi:
On hardware solution of dense linear systems via Gauss-Jordan Elimination. PACRIM 2015: 364-369 - [i1]M. Tarek Ibn Ziad, Amr Al-Anwar, Yousra Alkabani, M. Watheq El-Kharashi, Hassan Bedour:
Homomorphic Data Isolation for Hardware Trojan Protection. CoRR abs/1505.05226 (2015) - 2014
- [c15]M. Tarek Ibn Ziad, Amr Al-Anwar, Yousra Alkabani, M. Watheq El-Kharashi, Hassan Bedour:
E-Voting Attacks and Countermeasures. AINA Workshops 2014: 269-274 - 2013
- [c14]Amr Al-Anwar, Yousra Alkabani, M. Watheq El-Kharashi, Hassan Bedour:
Hardware Trojan Protection for Third Party IPs. DSD 2013: 662-665 - 2012
- [c13]Yousra Alkabani:
Trojan Immune Circuits Using Duality. DSD 2012: 177-184 - 2010
- [c12]Azalia Mirhoseini, Yousra Alkabani, Farinaz Koushanfar:
Real time emulations: foundation and applications. DAC 2010: 623-624 - [c11]Farinaz Koushanfar, Yousra Alkabani:
Provably Secure Obfuscation of Diverse Watermarks for Sequential Circuits. HOST 2010: 42-47 - [c10]Farinaz Koushanfar, Azalia Mirhoseini, Yousra Alkabani:
A Unified Submodular Framework for Multimodal IC Trojan Detection. Information Hiding 2010: 17-32
2000 – 2009
- 2009
- [c9]Yousra Alkabani, Farinaz Koushanfar:
Consistency-based characterization for IC Trojan detection. ICCAD 2009: 123-127 - [c8]Yousra Alkabani, Farinaz Koushanfar, Miodrag Potkonjak:
N-version temperature-aware scheduling and binding. ISLPED 2009: 331-334 - 2008
- [c7]Yousra Alkabani, Farinaz Koushanfar:
Active control and digital rights management of integrated circuit IP cores. CASES 2008: 227-234 - [c6]Yousra Alkabani, Farinaz Koushanfar:
N-variant IC design: methodology and applications. DAC 2008: 546-551 - [c5]Yousra Alkabani, Tammara Massey, Farinaz Koushanfar, Miodrag Potkonjak:
Input vector control for post-silicon leakage current minimization in the presence of manufacturing variability. DAC 2008: 606-609 - [c4]Yousra Alkabani, Farinaz Koushanfar:
Designer's Hardware Trojan Horse. HOST 2008: 82-83 - [c3]Yousra Alkabani, Farinaz Koushanfar, Negar Kiyavash, Miodrag Potkonjak:
Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. Information Hiding 2008: 102-117 - 2007
- [c2]Yousra Alkabani, Farinaz Koushanfar, Miodrag Potkonjak:
Remote activation of ICs for piracy prevention and digital right management. ICCAD 2007: 674-677 - [c1]Yousra Alkabani, Farinaz Koushanfar:
Active Hardware Metering for Intellectual Property Protection and Security. USENIX Security Symposium 2007
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint