default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 64 matches
- 2024
- Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark M. Tehranipoor, Farimah Farahmandi:
LLM for SoC Security: A Paradigm Shift. IEEE Access 12: 155498-155521 (2024) - Malay Kumar Majhi, Sujan Kumar Saha:
An automatic speech recognition system in Odia language using attention mechanism and data augmentation. Int. J. Speech Technol. 27(3): 717-728 (2024) - Dipayan Saha, Katayoon Yahyaei, Sujan Kumar Saha, Mark M. Tehranipoor, Farimah Farahmandi:
Empowering Hardware Security with LLM: The Development of a Vulnerable Hardware Database. HOST 2024: 233-243 - Md Sami Ul Islam Sami, Jingbo Zhou, Sujan Kumar Saha, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor:
SAP: Silicon Authentication Platform for System-on-Chip Supply Chain Vulnerabilities. ISPASS 2024: 109-119 - Avinash Ayalasomayajula, Rui Guo, Jingbo Zhou, Sujan Kumar Saha, Farimah Farahmandi:
LASP: LLM Assisted Security Property Generation for SoC Verification. MLCAD 2024: 29:1-29:7 - Shams Tarek, Dipayan Saha, Sujan Kumar Saha, Mark M. Tehranipoor, Farimah Farahmandi:
SoCureLLM: An LLM-driven Approach for Large-Scale System-on-Chip Security Verification and Policy Generation. IACR Cryptol. ePrint Arch. 2024: 983 (2024) - 2023
- Sarfraz Ahmed, Ammar Al-Bazi, Chitta Saha, Sujan Rajbhandari, Md. Nazmul Huda:
Multi-scale pedestrian intent prediction using 3D joint information as spatio-temporal representation. Expert Syst. Appl. 225: 120077 (2023) - Ankur Priyadarshi, Sujan Kumar Saha:
A Study on the Performance of Recurrent Neural Network based Models in Maithili Part of Speech Tagging. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(2): 32:1-32:16 (2023) - Dhawaleswar Rao CH, Sujan Kumar Saha:
Generation of Multiple-Choice Questions From Textbook Contents of School-Level Subjects. IEEE Trans. Learn. Technol. 16(1): 40-52 (2023) - Sujan Saha, Sailendra Malik, Sukumar Mandal:
Knowledge Graph Construction for Digital Repositories. World Digit. Libr. 16(1): 17-24 (2023) - Sujan Kumar Saha, Abigail N. Butka, Muhammed Kawser Ahmed, Christophe Bobda:
OpenTitan based Multi-Level Security in FPGA System-on-Chips. ICFPT 2023: 302-303 - Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark M. Tehranipoor, Farimah Farahmandi:
LLM for SoC Security: A Paradigm Shift. CoRR abs/2310.06046 (2023) - Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark M. Tehranipoor, Farimah Farahmandi:
LLM for SoC Security: A Paradigm Shift. IACR Cryptol. ePrint Arch. 2023: 1561 (2023) - 2022
- Aysha Akther, Md. Shymon Islam, Hafsa Sultana, A. K. Z. Rasel Rahman, Sujana Saha, Kazi Masudul Alam, Rameswar Debnath:
Compilation, Analysis and Application of a Comprehensive Bangla Corpus KUMono. IEEE Access 10: 79999-80014 (2022) - Sujan Kumar Saha, Dhawaleswar Rao CH:
Development of a practical system for computerized evaluation of descriptive answers of middle school level students. Interact. Learn. Environ. 30(2): 215-228 (2022) - Sujan Kumar Saha, Joel Mandebi Mbongue, Christophe Bobda:
Metrics for Assessing Security of System-on-Chip. HOST 2022: 113-116 - Muhammed Kawser Ahmed, Sujan Kumar Saha, Christophe Bobda:
Trusted IP Solution in Multi-tenant Cloud FPGA Platform. WF-IoT 2022: 1-6 - Aysha Akther, Md. Shymon Islam, Hafsa Sultana, A. K. Z. Rasel Rahman, Sujana Saha, Kazi Masudul Alam, Rameswar Debnath:
Compilation, Analysis and Application of a Comprehensive Bangla Corpus KUMono. IEEE DataPort, 2022 - Muhammed Kawser Ahmed, Joel Mandebi, Sujan Kumar Saha, Christophe Bobda:
Multi-Tenant Cloud FPGA: A Survey on Security. CoRR abs/2209.11158 (2022) - Muhammed Kawser Ahmed, Sujan Kumar Saha, Christophe Bobda:
Trusted IP solution in multi-tenant cloud FPGA platform. CoRR abs/2209.11274 (2022) - Muhammed Kawser Ahmed, Sujan Kumar Saha, Christophe Bobda:
TrustToken, a Trusted SoC solution for Non-Trusted Intellectual Property (IP)s. CoRR abs/2209.12987 (2022) - 2021
- Ankur Priyadarshi, Sujan Kumar Saha:
The first named entity recognizer in Maithili: Resource creation and system development. J. Intell. Fuzzy Syst. 41(1): 1083-1095 (2021) - Sujan Kumar Saha:
Towards development of a system for automatic assessment of the quality of a question paper. Smart Learn. Environ. 8(1): 4 (2021) - Joel Mandebi Mbongue, Sujan Kumar Saha, Christophe Bobda:
Domain Isolation in FPGA-Accelerated Cloud and Data Center Applications. ACM Great Lakes Symposium on VLSI 2021: 283-288 - Joel Mandebi Mbongue, Sujan Kumar Saha, Christophe Bobda:
Performance Study of Multi-tenant Cloud FPGAs. IPDPS Workshops 2021: 168-171 - Joel Mandebi Mbongue, Sujan Kumar Saha, Christophe Bobda:
A Security Architecture for Domain Isolation in Multi-Tenant Cloud FPGAs. ISVLSI 2021: 290-295 - 2020
- Ankur Priyadarshi, Sujan Kumar Saha:
Towards the first Maithili part of speech tagger: Resource creation and system development. Comput. Speech Lang. 62: 101054 (2020) - Sujan Kumar Saha, Rushali Gupta:
Adopting computer-assisted assessment in evaluation of handwritten answer books: An experimental study. Educ. Inf. Technol. 25(6): 4845-4860 (2020) - Ankur Priyadarshi, Sujan Kumar Saha:
Web Information Extraction for Finding Remedy Based on a Patient-Authored Text: A Study on Homeopathy. Netw. Model. Anal. Health Informatics Bioinform. 9(1): 9 (2020) - Rakesh Patra, Sujan Kumar Saha:
Utilizing external corpora through kernel function: application in biomedical named entity recognition. Prog. Artif. Intell. 9(3): 209-219 (2020)
skipping 34 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-10 08:49 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint