Mohammad H. Tehranipoor, Ph.D.

Affiliations: 
2004 University of Texas at Dallas, Richardson, TX, United States 
Area:
Electronics and Electrical Engineering
Google:
"Mohammad Tehranipoor"

Parents

Sign in to add mentor
Mehrdad Nourani grad student 2004 UT Dallas
 (Enhanced scan architectures for improving test application time and power.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Chen J, Wang S, Tehranipoor M. (2014) Critical-reliability path identification and delay analysis Acm Journal On Emerging Technologies in Computing Systems. 10: 12
Zhang X, Tehranipoor M. (2014) Design of On-Chip Lightweight Sensors for Effective Detection of Recycled ICs Ieee Transactions On Very Large Scale Integration Systems. 22: 1016-1029
Guin U, Dimase D, Tehranipoor M. (2014) Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead Journal of Electronic Testing. 30: 9-23
Zhang X, Ferraiuolo A, Tehranipoor M. (2013) Detection of trojans using a combined ring oscillator network and off-chip transient power analysis Acm Journal On Emerging Technologies in Computing Systems. 9
Bhunia S, Abramovici M, Agrawal D, et al. (2013) Protection against hardware trojan attacks: Towards a comprehensive solution Ieee Design and Test. 30: 6-17
Davoodi A, Li M, Tehranipoor M. (2013) A sensor-assisted self-authentication framework for hardware trojan detection Ieee Design and Test. 30: 74-82
Xiao K, Zhang X, Tehranipoor M. (2013) A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay Ieee Design & Test of Computers. 30: 26-34
Bao F, Peng K, Yilmaz M, et al. (2013) Efficient pattern generation for small-delay defects using selection of critical faults Journal of Electronic Testing: Theory and Applications (Jetta). 29: 35-48
Zhao W, Tehranipoor M, Chakravarty S. (2012) Ensuring Power-Safe Application of Test Patterns Using an Effective Gating Approach Considering Current Limits Journal of Low Power Electronics. 8: 235-247
Lamech C, Rad RM, Tehranipoor M, et al. (2011) An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities Ieee Transactions On Information Forensics and Security. 6: 1170-1179
See more...