Follow
Saumya Bhadauria
Saumya Bhadauria
Verified email at iiitm.ac.in
Title
Cited by
Cited by
Year
TL-HLS: methodology for low cost hardware Trojan security aware scheduling with optimal loop unrolling factor during high level synthesis
A Sengupta, S Bhadauria, SP Mohanty
IEEE Transactions on computer-aided design of integrated circuits and …, 2016
672016
Exploring low cost optimal watermark for reusable IP cores during high level synthesis
A Sengupta, S Bhadauria
IEEE Access 4, 2198-2215, 2016
662016
Embedding low cost optimal watermark during high level synthesis for reusable IP core protection
A Sengupta, S Bhadauria, SP Mohanty
2016 IEEE International Symposium on Circuits and Systems (ISCAS), 974-977, 2016
262016
Untrusted third party digital ip cores: Power-delay trade-off driven exploration of hardware trojan secured datapath during high level synthesis
A Sengupta, S Bhadauria
Proceedings of the 25th edition on Great Lakes Symposium on VLSI, 167-172, 2015
262015
Automated exploration of datapath in high level synthesis using temperature dependent bacterial foraging optimization algorithm
A Sengupta, S Bhadauria
2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering …, 2014
182014
Bacterial foraging driven exploration of multi cycle fault tolerant datapath based on power-performance tradeoff in high level synthesis
A Sengupta, S Bhadauria
Expert Systems with Applications 42 (10), 4719-4732, 2015
172015
Adaptive bacterial foraging driven datapath optimization: Exploring power-performance tradeoff in high level synthesis
S Bhadauria, A Sengupta
Applied Mathematics and Computation 269, 265-278, 2015
152015
Exploration of multi-objective tradeoff during high level synthesis using bacterial chemotaxis and dispersal
A Sengupta, S Bhadauria
Procedia Computer Science 35, 63-72, 2014
142014
Demand prediction for e-commerce advertisements: A comparative study using state-of-the-art machine learning methods
S Rai, A Gupta, A Anand, A Trivedi, S Bhadauria
2019 10th international conference on computing, communication and …, 2019
122019
A cost aware topology formation scheme for latency sensitive applications in edge infrastructure-as-a-service paradigm
H Gauttam, KK Pattanaik, S Bhadauria, D Saxena
Journal of Network and Computer Applications 199, 103303, 2022
112022
User power-delay budget driven PSO based design space exploration of optimal k-cycle transient fault secured datapath during high level synthesis
A Sengupta, S Bhadauria
Sixteenth International Symposium on Quality Electronic Design, 289-292, 2015
102015
Low‐cost security aware HLS methodology
A Sengupta, S Bhadauria, SP Mohanty
IET Computers & Digital Techniques 11 (2), 68-79, 2017
82017
Watermarking of deep recurrent neural network using adversarial examples to protect intellectual property
P Rathi, S Bhadauria, S Rathi
Applied Artificial Intelligence 36 (1), 2008613, 2022
62022
Application of cryptocurrencies using Blockchain for e-commerce online payment
K Adewole, N Saxena, S Bhadauria
Blockchain for Cybersecurity and Privacy, 263-305, 2020
52020
Hybrid Beamforming Channel Estimation With Reduced Phase shifter numbers for Massive MIMO Systems
PK Tyagi, A Trivedi, S Bhadauria
2019 International Conference on Electrical, Electronics and Computer …, 2019
52019
IP core protection of CDFGs using robust watermarking during behavioral synthesis based on user resource constraint and loop unrolling factor
A Sengupta, S Bhadauria
IET Electronics Letters 52 (6), 439-441, 2016
52016
Automated design space exploration of multi-cycle transient fault detectable datapath based on multi-objective user constraints for application specific computing
A Sengupta, S Bhadauria
Advances in Engineering Software 82, 14-24, 2015
52015
An efficient DNN splitting scheme for edge-AI enabled smart manufacturing
H Gauttam, KK Pattanaik, S Bhadauria, G Nain, PB Prakash
Journal of Industrial Information Integration 34, 100481, 2023
42023
Cookie based protocol to defend malicious browser extensions
J Joseph, S Bhadauria
2019 International Carnahan Conference on Security Technology (ICCST), 1-6, 2019
42019
Low cost optimized Trojan secured schedule at behavioral level for single & Nested loop control data flow graphs
A Sengupta, D Roy, S Bhadauria
Integration 58, 378-389, 2017
42017
The system can't perform the operation now. Try again later.
Articles 1–20