A robust FSM watermarking scheme for IP protection of sequential circuit design A Cui, CH Chang, S Tahar, AT Abdel-Hamid IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2011 | 121 | 2011 |
A survey on IP watermarking techniques AT Abdel-Hamid, S Tahar, EM Aboulhamid Design Automation for Embedded Systems 9, 211-227, 2004 | 117 | 2004 |
Automatic severity classification of diabetic retinopathy based on densenet and convolutional block attention module MM Farag, M Fouad, AT Abdel-Hamid IEEE Access 10, 38299-38308, 2022 | 113 | 2022 |
IP watermarking techniques: Survey and comparison AT Abdel-Hamid, S Tahar, EM Aboulhamid The 3rd IEEE International Workshop on System-on-Chip for Real-Time …, 2003 | 87 | 2003 |
A public-key watermarking technique for IP designs AT Abdel-Hamid, S Tahar, EM Aboulhamid Design, Automation and Test in Europe, 330-335, 2005 | 74 | 2005 |
A tool converting finite state machine to VHDL AT Abdel-Hamid, M Zaki, S Tahar Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat …, 2004 | 37 | 2004 |
FPGA implementation of dynamically reconfigurable IoT security module using algorithm hopping S Soliman, MA Jaela, AM Abotaleb, Y Hassan, MA Abdelghany, ... Integration 68, 108-121, 2019 | 31 | 2019 |
Verifying a synthesized implementation of IEEE-754 floating-point exponential function using HOL B Akbarpour, AT Abdel-Hamid, S Tahar, J Harrison The Computer Journal 53 (4), 465-488, 2010 | 29 | 2010 |
A comprehensive taxonomy and analysis of IEEE 802.15. 4 attacks YM Amin, AT Abdel-Hamid Journal of Electrical and Computer Engineering 2016 (1), 7165952, 2016 | 26 | 2016 |
Finite state machine IP watermarking: A tutorial AT Abdel-Hamid, S Tahar, EM Aboulhamid First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06), 457-464, 2006 | 24 | 2006 |
Fragile IP watermarking techniques AT Abdel-Hamid, S Tahar 2008 NASA/ESA Conference on Adaptive Hardware and Systems, 513-519, 2008 | 22 | 2008 |
Formal analysis of the handover schemes in mobile WiMAX networks AM Taha, AT Abdel-Hamid, S Tahar 2009 IFIP international conference on wireless and optical communications …, 2009 | 20 | 2009 |
Formal verification of IEEE 802.16 security sublayer using Scyther tool AM Taha, AT Abdel-Hamid, S Tahar 2009 International Conference on Network and Service Security, 1-5, 2009 | 18 | 2009 |
On detecting iot power signature anomalies using hidden markov model (hmm) MA Fouad, AT Abdel-Hamid 2019 31st International Conference on Microelectronics (ICM), 108-112, 2019 | 17 | 2019 |
A foldable textile-based broadband archimedean spiral rectenna for RF energy harvesting RM El Khosht, MA El Feshawy, MA El Shorbagy, MN Farag, AE El Said, ... 2016 16th Mediterranean Microwave Symposium (MMS), 1-4, 2016 | 16 | 2016 |
Classification and analysis of IEEE 802.15. 4 MAC layer attacks YM Amin, AT Abdel-Hamid 2015 11th International Conference on Innovations in Information Technology …, 2015 | 15 | 2015 |
Classification and analysis of IEEE 802.15. 4 PHY layer attacks YM Amin, AT Abdel-Hamid 2016 International Conference on Selected Topics in Mobile & Wireless …, 2016 | 13 | 2016 |
A tool for automatic watermarking of IP designs AT Abdel-Hamid, S Tahar, EM Aboulhamid The 2nd Annual IEEE Northeast Workshop on Circuits and Systems, 2004. NEWCAS …, 2004 | 10 | 2004 |
Applications of smart-contracts: anonymous decentralized insurances with IoT sensors O Mahmoud, H Kopp, AT Abdelhamid, F Kargl 2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018 | 9 | 2018 |
A Simulation Model of IEEE 802.15. 4 GTS Mechanism and GTS Attacks in OMNeT++/MiXiM+ NETA. YM Amin, AT Abdel-Hamid Comput. Inf. Sci. 11 (1), 78-89, 2018 | 8 | 2018 |