default search action
Zahra Kazemi
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Maryam Babaei, Alireza Afzal Aghaei, Zahra Kazemi, Mahdieh Jamshidi, Reza Ghaderi, Kourosh Parand:
Solving a class of Thomas-Fermi equations: A new solution concept based on physics-informed machine learning. Math. Comput. Simul. 225: 716-730 (2024) - [c15]Zahra Kazemi, Emre Yildiz, Peter Gorm Larsen:
Enabling Flexible Manufactuirng in Wind Industry Based on Movable Factory Concept: Definitions, Requirements, and Challenges. ICIT 2024: 1-7 - 2023
- [c14]Simon Thrane Hansen, Cláudio Gomes, Zahra Kazemi:
Synthesizing Orchestration Algorithms for FMI 3.0. ANNSIM 2023: 184-195 - [c13]Maryam Esmaeilian, Aghiles Douadi, Zahra Kazemi, Vincent Beroulle, Amir-Pasha Mirbaha, Mahdi Fazeli, Elena Ioana Vatajelu, Paolo Maistri, Giorgio Di Natale:
Experimental Evaluation of Delayed-Based Detectors Against Power-off Attack. IOLTS 2023: 1-3 - [c12]Zahra Kazemi, Peter Rindom Andersen, Jakob Lemming, Peter Gorm Larsen:
Artificial Intelligence-Based Diagnosis of Hydraulic Centrifugal Pumps Using Vibration Sensor: Feature Extraction and Failure Classification. ISIE 2023: 1-6 - 2022
- [j6]Amin Norollah, Zahra Kazemi, Hakem Beitollahi, David Hély:
Hardware Support for Efficient and Low-Power Data Sorting in Massive Data Application: The 3-D Sorting Method. IEEE Consumer Electron. Mag. 11(3): 87-94 (2022) - [j5]Amin Norollah, Hakem Beitollahi, Zahra Kazemi, Mahdi Fazeli:
A security-aware hardware scheduler for modern multi-core systems with hard real-time constraints. Microprocess. Microsystems 95: 104716 (2022) - [j4]Zahra Kazemi, Ali Akbar Safavi, Mohammad Mehdi Arefi, Farshid Naseri:
Finite-Time Secure Dynamic State Estimation for Cyber-Physical Systems Under Unknown Inputs and Sensor Attacks. IEEE Trans. Syst. Man Cybern. Syst. 52(8): 4950-4959 (2022) - [c11]Zahra Kazemi, Amin Norollah, Mahdi Fazeli, David Hély, Vincent Beroulle:
An Offline Hardware Security Assessment Approach using Symbol Assertion and Code Shredding. ISQED 2022: 1 - 2021
- [c10]Zahra Kazemi, Amin Norollah, Afef Kchaou, Mahdi Fazeli, David Hély, Vincent Beroulle:
An In-Depth Vulnerability Analysis of RISC-V Micro-Architecture Against Fault Injection Attack. DFT 2021: 1-6 - [c9]Amin Norollah, Zahra Kazemi, Niloufar Sayadi, Hakem Beitollahi, Mahdi Fazeli, David Hély:
Efficient Scheduling of Dependent Tasks in Many-Core Real-Time System Using a Hardware Scheduler. HPEC 2021: 1-7 - 2020
- [j3]Farshid Naseri, Ebrahim Farjah, Teymoor Ghanbari, Zahra Kazemi, Erik Schaltz, Jean-Luc Schanen:
Online Parameter Estimation for Supercapacitor State-of-Energy and State-of-Health Determination in Vehicular Applications. IEEE Trans. Ind. Electron. 67(9): 7963-7972 (2020) - [j2]Zahra Kazemi, Ali Akbar Safavi, Farshid Naseri, Leon Urbas, Peyman Setoodeh:
A Secure Hybrid Dynamic-State Estimation Approach for Power Systems Under False Data Injection Attacks. IEEE Trans. Ind. Informatics 16(12): 7275-7286 (2020) - [c8]Zahra Kazemi, Mahdi Fazeli, David Hély, Vincent Beroulle:
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application. IOLTS 2020: 1-6 - [c7]Amin Norollah, Zahra Kazemi, David Hély:
3D-Sorter: 3D Design of a Resource-Aware Hardware Sorter for Edge Computing Platforms Under Area and Energy Consumption Constraints. ISVLSI 2020: 42-47
2010 – 2019
- 2019
- [c6]Amin Norollah, Zahra Kazemi, Hakem Beitollahi:
An Efficient Sorting Architecture for Area and Energy Constrained Edge Computing Devices. HPCS 2019: 455-462 - [c5]Zahra Kazemi, Athanasios Papadimitriou, Ioanna Souvatzoglou, Ehsan Aerabi, Mosabbah Mushir Ahmed, David Hély, Vincent Beroulle:
On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks. IVSW 2019: 7-12 - [c4]Arash Nejat, Zahra Kazemi, Vincent Beroulle, David Hély, Mahdi Fazeli:
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection. IVSW 2019: 49-54 - 2018
- [c3]Zahra Kazemi, Athanasios Papadimitriou, David Hély, Mahdi Fazeli, Vincent Beroulle:
Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT. IVSW 2018: 87-92 - 2016
- [j1]Zahra Kazemi, Ahmad Jafari Samimi, Hamed Fazlollahtabar:
Risk Analysis for Knowledge Sharing in Tax Payment. Int. J. Knowl. Based Organ. 6(1): 20-37 (2016) - [c2]Mohammad Saleh Samimi, Ehsan Aerabi, Zahra Kazemi, Mahdi Fazeli, Ahmad Patooghy:
Hardware enlightening: No where to hide your Hardware Trojans! IOLTS 2016: 251-256 - 2012
- [c1]Amir Reza Fazli, Mohammad Eghbali Asli, Zahra Kazemi, Ghazaleh Sarbisheie:
Security improvement for audio watermarking in image using BCH coding. CSNDSP 2012: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint