default search action
Tara Ghasempouri
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Tara Ghasempouri, Jaan Raik, Cezar Reinbrecht, Said Hamdioui, Mottaqiallah Taouil:
Survey on Architectural Attacks: A Unified Classification and Attack Model. ACM Comput. Surv. 56(2): 42:1-42:32 (2024) - [j4]Mohammad Eslami, Tara Ghasempouri, Samuel Pagliarini:
SCARF: Securing Chips With a Robust Framework Against Fabrication-Time Hardware Trojans. IEEE Trans. Computers 73(12): 2761-2775 (2024) - [c28]Mohammad Reza Heidari Iman, Gert Jervan, Tara Ghasempouri:
ARTmine: Automatic Association Rule Mining with Temporal Behavior for Hardware Verification. DATE 2024: 1-6 - [c27]Andrew Roberts, Mohammad Reza Heidari Iman, Mauro Bellone, Tara Ghasempouri, Jaan Raik, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst:
ADAssure: Debugging Methodology for Autonomous Driving Control Algorithms. DATE 2024: 1-6 - [c26]Bahram Parchekani, Samira Nazari, Mohammad Hasan Ahmadilivani, Ali Azarpeyvand, Jaan Raik, Tara Ghasempouri, Masoud Daneshtalab:
Zero-Memory-Overhead Clipping-Based Fault Tolerance for LSTM Deep Neural Networks. DFT 2024: 1-4 - [c25]Mahdi Taheri, Natalia Cherezova, Samira Nazari, Ahsan Rafiq, Ali Azarpeyvand, Tara Ghasempouri, Masoud Daneshtalab, Jaan Raik, Maksim Jenihhin:
AdAM: Adaptive Fault-Tolerant Approximate Multiplier for Edge DNN Accelerators. ETS 2024: 1-4 - [c24]Hossein Rostami, Mostafa Hosseini, Ali Azarpeyvand, Mohammad Reza Heidari Iman, Tara Ghasempouri:
Automatic High Functional Coverage Stimuli Generation for Assertion-based Verification. IOLTS 2024: 1-7 - [c23]Mohammad Reza Heidari Iman, Sallar Ahmadi-Pour, Rolf Drechsler, Tara Ghasempouri:
Processor Vulnerability Detection with the Aid of Assertions: RISC-V Case Study. NorCAS 2024: 1-7 - [i5]Mohammad Eslami, Tara Ghasempouri, Samuel Pagliarini:
SCARF: Securing Chips with a Robust Framework against Fabrication-time Hardware Trojans. CoRR abs/2402.12162 (2024) - [i4]Mahdi Taheri, Natalia Cherezova, Samira Nazari, Ahsan Rafiq, Ali Azarpeyvand, Tara Ghasempouri, Masoud Daneshtalab, Jaan Raik, Maksim Jenihhin:
AdAM: Adaptive Fault-Tolerant Approximate Multiplier for Edge DNN Accelerators. CoRR abs/2403.02936 (2024) - 2023
- [j3]Mohammad Reza Heidari Iman, Jaan Raik, Maksim Jenihhin, Gert Jervan, Tara Ghasempouri:
An automated method for mining high-quality assertion sets. Microprocess. Microsystems 97: 104773 (2023) - [c22]Mohammad Reza Heidari Iman, Pavel Chikul, Gert Jervan, Hayretdin Bahsi, Tara Ghasempouri:
Anomalous File System Activity Detection Through Temporal Association Rule Mining. ICISSP 2023: 733-740 - 2022
- [c21]Mahtab Shahin, Mohammad Reza Heidari Iman, Minakshi Kaushik, Rahul Sharma, Tara Ghasempouri, Dirk Draheim:
Exploring Factors in a Crossroad Dataset Using Cluster-Based Association Rule Mining. ANT/EDI40 2022: 231-238 - [c20]Mohammad Reza Heidari Iman, Jaan Raik, Gert Jervan, Tara Ghasempouri:
IMMizer: An Innovative Cost-Effective Method for Minimizing Assertion Sets. DSD 2022: 671-678 - [c19]Mohammad Eslami, Tara Ghasempouri, Samuel Pagliarini:
Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection. ISQED 2022: 1-6 - [i3]Mohammad Eslami, Tara Ghasempouri, Samuel Pagliarini:
Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection. CoRR abs/2201.01130 (2022) - [i2]Tara Ghasempouri, Jaan Raik, Cezar Reinbrecht, Said Hamdioui, Mottaqiallah Taouil:
Survey on Architectural Attacks: A Unified Classification and Attack Model. CoRR abs/2208.14194 (2022) - 2021
- [c18]Ameer Shalabi, Tara Ghasempouri, Peeter Ellervee, Jaan Raik:
CLD: An Accurate, Cost-Effective and Scalable Run-Time Cache Leakage Detector. DDECS 2021: 127-132 - [c17]Mohammad Reza Heidari Iman, Jaan Raik, Maksim Jenihhin, Gert Jervan, Tara Ghasempouri:
A Methodology for Automated Mining of Compact and Accurate Assertion Sets. NorCAS 2021: 1-7 - 2020
- [c16]Tara Ghasempouri, Jaan Raik, Kolin Paul, Cezar Reinbrecht, Said Hamdioui, Mottaqiallah Taouil:
A Security Verification Template to Assess Cache Architecture Vulnerabilities. DDECS 2020: 1-6 - [c15]Ameer Shalabi, Tara Ghasempouri, Peeter Ellervee, Jaan Raik:
SCAAT: Secure Cache Alternative Address Table for mitigating cache logical side-channel attacks. DSD 2020: 213-217 - [c14]Mohammad Riazati, Tara Ghasempouri, Masoud Daneshtalab, Jaan Raik, Mikael Sjödin, Björn Lisper:
Adjustable self-healing methodology for accelerated functions in heterogeneous systems. DSD 2020: 638-645 - [c13]Cezar Reinbrecht, Said Hamdioui, Mottaqiallah Taouil, Behrad Niazmand, Tara Ghasempouri, Jaan Raik, Johanna Sepúlveda:
LiD-CAT: A Lightweight Detector for Cache ATtacks. ETS 2020: 1-6 - [c12]Ameer Shalabi, Kolin Paul, Tara Ghasempouri, Jaan Raik:
NV-SP: A New High Performance and Low Energy NVM-Based Scratch Pad. ISVLSI 2020: 54-59
2010 – 2019
- 2019
- [j2]Xinhui Lai, Aneesh Balakrishnan, Thomas Lange, Maksim Jenihhin, Tara Ghasempouri, Jaan Raik, Dan Alexandrescu:
Understanding multidimensional verification: Where functional meets non-functional. Microprocess. Microsystems 71 (2019) - [c11]Tara Ghasempouri, Alessandro Danese, Graziano Pravadelli, Nicola Bombieri, Jaan Raik:
RTL Assertion Mining with Automated RTL-to-TLM Abstraction. FDL 2019: 1-8 - [c10]Tara Ghasempouri, Jan Malburg, Alessandro Danese, Graziano Pravadelli, Görschwin Fey, Jaan Raik:
Engineering of an Effective Automatic Dynamic Assertion Mining Platform. VLSI-SoC 2019: 111-116 - [i1]Maksim Jenihhin, Xinhui Lai, Tara Ghasempouri, Jaan Raik:
Towards Multidimensional Verification: Where Functional Meets Non-Functional. CoRR abs/1908.00314 (2019) - 2018
- [c9]Ranganathan Hariharan, Tara Ghasempouri, Behrad Niazmand, Jaan Raik:
From RTL Liveness Assertions to Cost-Effective Hardware Checkers. DCIS 2018: 1-6 - [c8]Tara Ghasempouri, Siavoosh Payandeh Azad, Behrad Niazmand, Jaan Raik:
An Automatic Approach to Evaluate Assertions' Quality Based on Data-Mining Metrics. ITC-Asia 2018: 61-66 - [c7]Behrad Niazmand, Siavoosh Payandeh Azad, Tara Ghasempouri, Jaan Raik, Gert Jervan:
A Hierarchical Approach for Devising Area Efficient Concurrent Online Checkers. ITC-Asia 2018: 139-144 - [c6]Maksim Jenihhin, Xinhui Lai, Tara Ghasempouri, Jaan Raik:
Towards Multidimensional Verification: Where Functional Meets Non-Functional. NORCAS 2018: 1-7 - [c5]Görschwin Fey, Tara Ghasempouri, Swen Jacobs, Gianluca Martino, Jaan Raik, Heinz Riener:
Design Understanding: From Logic to Specification*. VLSI-SoC 2018: 172-175 - 2015
- [j1]Nicola Bombieri, Franco Fummi, Valerio Guarnieri, Graziano Pravadelli, Francesco Stefanni, Tara Ghasempouri, Michele Lora, Giovanni Auditore, Mirella Negro Marcigaglia:
Reusing RTL Assertion Checkers for Verification of SystemC TLM Models. J. Electron. Test. 31(2): 167-180 (2015) - [c4]Alessandro Danese, Tara Ghasempouri, Graziano Pravadelli:
Automatic extraction of assertions from execution traces of behavioural models. DATE 2015: 67-72 - [c3]Alessandro Danese, Francesca Filini, Tara Ghasempouri, Graziano Pravadelli:
Automatic Generation and Qualification of Assertions on Control Signals: A Time Window-Based Approach. VLSI-SoC (Selected Papers) 2015: 193-221 - [c2]Tara Ghasempouri, Graziano Pravadelli:
On the estimation of assertion interestingness. VLSI-SoC 2015: 325-330 - 2014
- [c1]Nicola Bombieri, Franco Fummi, Valerio Guarnieri, Graziano Pravadelli, Francesco Stefanni, Tara Ghasempouri, Michele Lora, Giovanni Auditore, Mirella Negro Marcigaglia:
On the reuse of RTL assertions in SystemC TLM verification. LATW 2014: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint