


Остановите войну!
for scientists:


default search action
Khaza Anuarul Hoque
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i19]Syed Tihaam Ahmad, Ayesha Siddique, Khaza Anuarul Hoque:
Security-Aware Approximate Spiking Neural Networks. CoRR abs/2301.05264 (2023) - [i18]Ayesha Siddique, Khaza Anuarul Hoque:
Improving Reliability of Spiking Neural Networks through Fault Aware Threshold Voltage Optimization. CoRR abs/2301.05266 (2023) - [i17]Ayesha Siddique, Khaza Anuarul Hoque:
Exposing Reliability Degradation and Mitigation in Approximate DNNs under Permanent Faults. CoRR abs/2301.07484 (2023) - 2022
- [j8]Ernest Bonnah, Khaza Anuarul Hoque
:
Runtime Monitoring of Time Window Temporal Logic. IEEE Robotics Autom. Lett. 7(3): 5888-5895 (2022) - [j7]Samaikya Valluripally
, Aniket Gulhane, Khaza Anuarul Hoque
, Prasad Calyam
:
Modeling and Defense of Social Virtual Reality Attacks Inducing Cybersickness. IEEE Trans. Dependable Secur. Comput. 19(6): 4127-4144 (2022) - [c20]Ayesha Siddique, Khaza Anuarul Hoque:
Is Approximation Universally Defensive Against Adversarial Attacks in Deep Neural Networks? DATE 2022: 364-369 - [c19]Ripan Kumar Kundu, Rifatul Islam, Prasad Calyam, Khaza Anuarul Hoque:
TruVR: Trustworthy Cybersickness Detection using Explainable Machine Learning. ISMAR 2022: 777-786 - [i16]Ripan Kumar Kundu, Rifatul Islam, Prasad Calyam, Khaza Anuarul Hoque:
TruVR: Trustworthy Cybersickness Detection using Explainable Machine Learning. CoRR abs/2209.05257 (2022) - 2021
- [c18]Naga Ramya Bhamidipati, Varsha Vakkavanthula, George Stafford, Masrik A. Dahir, Roshan Lal Neupane, Ernest Bonnah, Songjie Wang, J. V. R. Murthy, Khaza Anuarul Hoque, Prasad Calyam:
ClaimChain: Secure Blockchain Platform for Handling Insurance Claims Processing. Blockchain 2021: 55-64 - [c17]Samaikya Valluripally, Vaibhav Akashe, Michael Fisher, David Falana, Khaza Anuarul Hoque, Prasad Calyam:
Rule-based Adaptations to Control Cybersickness in Social Virtual Reality Learning Environments. FiCloud 2021: 350-358 - [c16]Ayesha Siddique, Kanad Basu, Khaza Anuarul Hoque:
Exploring Fault-Energy Trade-offs in Approximate DNN Hardware Accelerators. ISQED 2021: 343-348 - [i15]Ayesha Siddique, Kanad Basu, Khaza Anuarul Hoque:
Exploring Fault-Energy Trade-offs in Approximate DNN Hardware Accelerators. CoRR abs/2101.02860 (2021) - [i14]Samaikya Valluripally, Vaibhav Akashe, Michael Fisher, David Falana, Khaza Anuarul Hoque, Prasad Calyam:
Rule-based Adaptations to Control Cybersickness in Social Virtual Reality Learning Environments. CoRR abs/2108.12315 (2021) - [i13]Ayesha Siddique, Khaza Anuarul Hoque:
Is Approximation Universally Defensive Against Adversarial Attacks in Deep Neural Networks? CoRR abs/2112.01555 (2021) - 2020
- [c15]Gautam Raj Mode, Khaza Anuarul Hoque:
Adversarial Examples in Deep Learning for Multivariate Time Series Regression. AIPR 2020: 1-10 - [c14]Samaikya Valluripally, Aniket Gulhane, Reshmi Mitra, Khaza Anuarul Hoque, Prasad Calyam:
Attack Trees for Security and Privacy in Social Virtual Reality Learning Environments. CCNC 2020: 1-9 - [c13]Gautam Raj Mode, Khaza Anuarul Hoque:
Crafting Adversarial Examples for Deep Learning Based Prognostics. ICMLA 2020: 467-472 - [c12]Shamik Kundu, Ahmet Soyyigit, Khaza Anuarul Hoque, Kanad Basu:
High-level Modeling of Manufacturing Faults in Deep Neural Network Accelerators. IOLTS 2020: 1-4 - [c11]Gautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque:
Impact of False Data Injection Attacks on Deep Learning Enabled Predictive Analytics. NOMS 2020: 1-7 - [i12]Shamik Kundu, Ahmet Soyyigit, Khaza Anuarul Hoque, Kanad Basu:
High-level Modeling of Manufacturing Faults in Deep Neural Network Accelerators. CoRR abs/2006.03616 (2020) - [i11]Gautam Raj Mode, Khaza Anuarul Hoque:
Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version). CoRR abs/2009.10149 (2020) - [i10]Gautam Raj Mode, Khaza Anuarul Hoque:
Adversarial Examples in Deep Learning for Multivariate Time Series Regression. CoRR abs/2009.11911 (2020)
2010 – 2019
- 2019
- [j6]Khaza Anuarul Hoque
, Otmane Aït Mohamed, Yvon Savaria:
Dependability modeling and optimization of triple modular redundancy partitioning for SRAM-based FPGAs. Reliab. Eng. Syst. Saf. 182: 107-119 (2019) - [c10]Aniket Gulhane, Akhil Vyas, Reshmi Mitra, Roland Oruche, Gabriela Hoefer, Samaikya Valluripally, Prasad Calyam, Khaza Anuarul Hoque:
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications. CCNC 2019: 1-9 - [i9]Khaza Anuarul Hoque, Nathalie Cauchi, Alessandro Abate:
Analyzing Occupancy-Driven Thermal Dynamics in Smart Buildings. CoRR abs/1903.06123 (2019) - [i8]Gautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque:
False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics. CoRR abs/1910.01716 (2019) - [i7]Samaikya Valluripally, Aniket Gulhane, Reshmi Mitra, Khaza Anuarul Hoque, Prasad Calyam:
Attack Trees for Security and Privacy in Social Virtual Reality Learning Environments. CoRR abs/1911.03563 (2019) - 2018
- [j5]Muhammad Usama Sardar
, Nida Afaq, Osman Hasan
, Khaza Anuarul Hoque:
Towards Probabilistic Formal Analysis of SATS-Simultaneously Moving Aircraft (SATS-SMA). J. Autom. Reason. 60(1): 85-105 (2018) - [j4]Luan Viet Nguyen
, Khaza Anuarul Hoque
, Stanley Bak, Steven Drager, Taylor T. Johnson
:
Cyber-Physical Specification Mismatches. ACM Trans. Cyber Phys. Syst. 2(4): 23:1-23:26 (2018) - [j3]Nathalie Cauchi
, Khaza Anuarul Hoque, Mariëlle Stoelinga
, Alessandro Abate:
Maintenance of Smart Buildings using Fault Trees. ACM Trans. Sens. Networks 14(3-4): 28:1-28:25 (2018) - [c9]Alessandro Abate, Carlos E. Budde
, Nathalie Cauchi, Arnaud van Harmelen, Khaza Anuarul Hoque, Mariëlle Stoelinga
:
Modelling Smart Buildings Using Fault Maintenance Trees. EPEW 2018: 110-125 - [i6]Nathalie Cauchi, Khaza Anuarul Hoque, Alessandro Abate, Mariëlle Stoelinga:
Efficient Probabilistic Model Checking of Smart Building Maintenance using Fault Maintenance Trees. CoRR abs/1801.04263 (2018) - [i5]Khaza Anuarul Hoque, Otmane Aït Mohamed, Yvon Savaria:
Formal Dependability Modeling and Optimization of Scrubbed-Partitioned TMR for SRAM-based FPGAs. CoRR abs/1801.04886 (2018) - [i4]Nathalie Cauchi, Khaza Anuarul Hoque, Mariëlle Stoelinga, Alessandro Abate:
Maintenance of Smart Buildings using Fault Trees. CoRR abs/1806.05174 (2018) - [i3]Luan Viet Nguyen, Khaza Anuarul Hoque, Stanley Bak, Steven Drager, Taylor T. Johnson:
Cyber-Physical Specification Mismatches. CoRR abs/1806.09224 (2018) - [i2]Aniket Gulhane, Akhil Vyas, Reshmi Mitra, Roland Oruche, Gabriela Hoefer, Samaikya Valluripally, Prasad Calyam, Khaza Anuarul Hoque:
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications. CoRR abs/1811.12476 (2018) - 2017
- [j2]Khaza Anuarul Hoque, Otmane Aït Mohamed, Yvon Savaria:
Formal analysis of SEU mitigation for early dependability and performability analysis of FPGA-based space applications. J. Appl. Log. 25: 47-68 (2017) - [c8]Umair Siddique, Khaza Anuarul Hoque, Taylor T. Johnson
:
Formal specification and dependability analysis of optical communication networks. DATE 2017: 1564-1569 - [c7]Nathalie Cauchi, Khaza Anuarul Hoque, Alessandro Abate, Mariëlle Stoelinga
:
Efficient probabilistic model checking of smart building maintenance using fault maintenance trees. BuildSys@SenSys 2017: 24:1-24:10 - [i1]Khaza Anuarul Hoque, Otmane Aït Mohamed, Yvon Savaria:
Formal Analysis of SEU Mitigation for Early Dependability and Performability Analysis of FPGA-based Space Applications. CoRR abs/1701.03836 (2017) - 2016
- [c6]Muhammad Usama Sardar, Nida Afaq, Khaza Anuarul Hoque, Taylor T. Johnson
, Osman Hasan
:
Probabilistic Formal Verification of the SATS Concept of Operation. NFM 2016: 191-205 - [c5]Marwan Ammar, Khaza Anuarul Hoque, Otmane Aït Mohamed:
Formal analysis of fault tree using probabilistic model checking: A solar array case study. SysCon 2016: 1-6 - [c4]Khaza Anuarul Hoque, Otmane Aït Mohamed, Yvon Savaria:
Applying formal verification to early assessment of FPGA-based aerospace applications: Methodology and experience. SysCon 2016: 1-6 - 2015
- [c3]Khaza Anuarul Hoque, Otmane Aït Mohamed, Yvon Savaria:
Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking. DATE 2015: 1635-1640 - 2014
- [c2]Khaza Anuarul Hoque, Otmane Aït Mohamed, Yvon Savaria, Claude Thibeault:
Probabilistic model checking based DAL analysis to optimize a combined TMR-blind-scrubbing mitigation technique for FPGA-based aerospace applications. MEMOCODE 2014: 175-184 - 2013
- [c1]Khaza Anuarul Hoque, Otmane Aït Mohamed, Yvon Savaria, Claude Thibeault:
Early Analysis of Soft Error Effects for Aerospace Applications Using Probabilistic Model Checking. FTSCS 2013: 54-70 - 2012
- [j1]Khaza Anuarul Hoque, Otmane Aït Mohamed, Sa'ed Abed
, Mounir Boukadoum:
MDG-SAT: an automated methodology for efficient safety checking. Int. J. Crit. Comput. Based Syst. 3(1/2): 4-25 (2012)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2023-01-20 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint