[{"date_updated":"2026-03-17T15:29:29Z","citation":{"ieee":"M. I. Köse, Q. A. Ahmed, and T. Jungeblut, “Bridging the Gap Between AI Quantization and Edge Deployment: INT4 and INT8 on the Edge,” in <i>The 5th Muslims in Machine Learning (MusIML) Workshop co-located with NeurIPS 2025</i>, San Diego, CA, USA., 2025.","bibtex":"@inproceedings{Köse_Ahmed_Jungeblut_2025, place={San Diego, CA, USA.}, title={Bridging the Gap Between AI Quantization and Edge Deployment: INT4 and INT8 on the Edge}, booktitle={The 5th Muslims in Machine Learning (MusIML) Workshop co-located with NeurIPS 2025}, author={Köse, Mohammad Ibrahim and Ahmed, Qazi Arbab and Jungeblut, Thorsten}, editor={NeurIPS 2025 Editor}, year={2025} }","apa":"Köse, M. I., Ahmed, Q. A., &#38; Jungeblut, T. (2025). Bridging the Gap Between AI Quantization and Edge Deployment: INT4 and INT8 on the Edge. In NeurIPS 2025  (Ed.), <i>The 5th Muslims in Machine Learning (MusIML) Workshop co-located with NeurIPS 2025</i>. San Diego, CA, USA.","alphadin":"<span style=\"font-variant:small-caps;\">Köse, Mohammad Ibrahim</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: Bridging the Gap Between AI Quantization and Edge Deployment: INT4 and INT8 on the Edge. In: <span style=\"font-variant:small-caps;\">NeurIPS 2025 </span> (Hrsg.): <i>The 5th Muslims in Machine Learning (MusIML) Workshop co-located with NeurIPS 2025</i>. San Diego, CA, USA., 2025","short":"M.I. Köse, Q.A. Ahmed, T. Jungeblut, in: NeurIPS 2025  (Ed.), The 5th Muslims in Machine Learning (MusIML) Workshop Co-Located with NeurIPS 2025, San Diego, CA, USA., 2025.","chicago":"Köse, Mohammad Ibrahim, Qazi Arbab Ahmed, and Thorsten Jungeblut. “Bridging the Gap Between AI Quantization and Edge Deployment: INT4 and INT8 on the Edge.” In <i>The 5th Muslims in Machine Learning (MusIML) Workshop Co-Located with NeurIPS 2025</i>, edited by NeurIPS 2025 . San Diego, CA, USA., 2025.","ama":"Köse MI, Ahmed QA, Jungeblut T. Bridging the Gap Between AI Quantization and Edge Deployment: INT4 and INT8 on the Edge. In: NeurIPS 2025 , ed. <i>The 5th Muslims in Machine Learning (MusIML) Workshop Co-Located with NeurIPS 2025</i>. San Diego, CA, USA.; 2025.","mla":"Köse, Mohammad Ibrahim, et al. “Bridging the Gap Between AI Quantization and Edge Deployment: INT4 and INT8 on the Edge.” <i>The 5th Muslims in Machine Learning (MusIML) Workshop Co-Located with NeurIPS 2025</i>, edited by NeurIPS 2025 , 2025."},"author":[{"first_name":"Mohammad Ibrahim","full_name":"Köse, Mohammad Ibrahim","last_name":"Köse"},{"full_name":"Ahmed, Qazi Arbab","orcid":"0000-0002-1837-2254","last_name":"Ahmed","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/198746983","id":"257333","first_name":"Qazi Arbab"},{"id":"242294","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/198746984","first_name":"Thorsten","last_name":"Jungeblut","full_name":"Jungeblut, Thorsten","orcid":"0000-0001-7425-8766"}],"place":"San Diego, CA, USA.","status":"public","conference":{"end_date":"2025.12.05","start_date":"2025-11-29","name":"NeurIPS 2025 in San Diego, CA, USA.","location":"San Diego, CA, USA."},"_id":"6365","year":"2025","language":[{"iso":"eng"}],"date_created":"2025-12-04T14:43:07Z","title":"Bridging the Gap Between AI Quantization and Edge Deployment: INT4 and INT8 on the Edge","department":[{"_id":"103"}],"publication_status":"published","publication":"The 5th Muslims in Machine Learning (MusIML) Workshop co-located with NeurIPS 2025","project":[{"_id":"beb248c8-cd75-11ed-b77c-e432b4711f7b","name":"Institut für Systemdynamik und Mechatronik"}],"type":"conference_abstract","corporate_editor":["NeurIPS 2025 "],"main_file_link":[{"url":"https://neurips.cc/virtual/2025/loc/san-diego/132986"}],"user_id":"263827"},{"doi":"10.1109/DSN-W65791.2025.00048","page":"115-118","publisher":"IEEE","date_updated":"2026-03-17T15:29:26Z","citation":{"ieee":"F. Jalil, M. Awais, Q. A. Ahmed, H. G. Mohammadi, T. Jungeblut, and M. Platzner, “Deep&#38;Wide: Achieving Area Efficiency in Scalable Approximate Accelerators,” in <i>2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)</i>, Naples, Italy , 2025, pp. 115–118.","alphadin":"<span style=\"font-variant:small-caps;\">Jalil, Farjana</span> ; <span style=\"font-variant:small-caps;\">Awais, Muhammad</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Mohammadi, Hassan Ghasemzadeh</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span> ; <span style=\"font-variant:small-caps;\">Platzner, Marco</span>: Deep&#38;Wide: Achieving Area Efficiency in Scalable Approximate Accelerators. In: <span style=\"font-variant:small-caps;\">Institute of Electrical and Electronics Engineers (IEEE)</span> (Hrsg.): <i>2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)</i> : IEEE, 2025, S. 115–118","bibtex":"@inproceedings{Jalil_Awais_Ahmed_Mohammadi_Jungeblut_Platzner_2025, title={Deep&#38;Wide: Achieving Area Efficiency in Scalable Approximate Accelerators}, DOI={<a href=\"https://doi.org/10.1109/DSN-W65791.2025.00048\">10.1109/DSN-W65791.2025.00048</a>}, booktitle={2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)}, publisher={IEEE}, author={Jalil, Farjana and Awais, Muhammad and Ahmed, Qazi Arbab and Mohammadi, Hassan Ghasemzadeh and Jungeblut, Thorsten and Platzner, Marco}, editor={Institute of Electrical and Electronics Engineers (IEEE)Editor}, year={2025}, pages={115–118} }","apa":"Jalil, F., Awais, M., Ahmed, Q. A., Mohammadi, H. G., Jungeblut, T., &#38; Platzner, M. (2025). Deep&#38;Wide: Achieving Area Efficiency in Scalable Approximate Accelerators. In Institute of Electrical and Electronics Engineers (IEEE) (Ed.), <i>2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)</i> (pp. 115–118). Naples, Italy : IEEE. <a href=\"https://doi.org/10.1109/DSN-W65791.2025.00048\">https://doi.org/10.1109/DSN-W65791.2025.00048</a>","short":"F. Jalil, M. Awais, Q.A. Ahmed, H.G. Mohammadi, T. Jungeblut, M. Platzner, in: Institute of Electrical and Electronics Engineers (IEEE) (Ed.), 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), IEEE, 2025, pp. 115–118.","chicago":"Jalil, Farjana, Muhammad Awais, Qazi Arbab Ahmed, Hassan Ghasemzadeh Mohammadi, Thorsten Jungeblut, and Marco Platzner. “Deep&#38;Wide: Achieving Area Efficiency in Scalable Approximate Accelerators.” In <i>2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)</i>, edited by Institute of Electrical and Electronics Engineers (IEEE), 115–18. IEEE, 2025. <a href=\"https://doi.org/10.1109/DSN-W65791.2025.00048\">https://doi.org/10.1109/DSN-W65791.2025.00048</a>.","mla":"Jalil, Farjana, et al. “Deep&#38;Wide: Achieving Area Efficiency in Scalable Approximate Accelerators.” <i>2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)</i>, edited by Institute of Electrical and Electronics Engineers (IEEE), IEEE, 2025, pp. 115–18, doi:<a href=\"https://doi.org/10.1109/DSN-W65791.2025.00048\">10.1109/DSN-W65791.2025.00048</a>.","ama":"Jalil F, Awais M, Ahmed QA, Mohammadi HG, Jungeblut T, Platzner M. Deep&#38;Wide: Achieving Area Efficiency in Scalable Approximate Accelerators. In: Institute of Electrical and Electronics Engineers (IEEE), ed. <i>2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)</i>. IEEE; 2025:115-118. doi:<a href=\"https://doi.org/10.1109/DSN-W65791.2025.00048\">10.1109/DSN-W65791.2025.00048</a>"},"author":[{"full_name":"Jalil, Farjana","last_name":"Jalil","id":"260919","first_name":"Farjana"},{"full_name":"Awais, Muhammad","last_name":"Awais","first_name":"Muhammad"},{"full_name":"Ahmed, Qazi Arbab","orcid":"0000-0002-1837-2254","last_name":"Ahmed","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/188568216","id":"257333","first_name":"Qazi Arbab"},{"first_name":"Hassan Ghasemzadeh","last_name":"Mohammadi","full_name":"Mohammadi, Hassan Ghasemzadeh"},{"orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/188568217","id":"242294","first_name":"Thorsten","full_name":"Jungeblut, Thorsten","orcid":"0000-0001-7425-8766","last_name":"Jungeblut"},{"full_name":"Platzner, Marco","last_name":"Platzner","first_name":"Marco"}],"conference":{"name":"55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","location":"Naples, Italy ","end_date":"2025-06-26","start_date":"2025-06-23"},"status":"public","year":"2025","_id":"6073","language":[{"iso":"eng"}],"title":"Deep&Wide: Achieving Area Efficiency in Scalable Approximate Accelerators","date_created":"2025-07-24T11:31:57Z","department":[{"_id":"103"}],"publication_status":"published","publication":"2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","type":"conference","publication_identifier":{"eisbn":["979-8-3315-1205-7"]},"oa":"1","project":[{"_id":"beb248c8-cd75-11ed-b77c-e432b4711f7b","name":"Institut für Systemdynamik und Mechatronik"}],"user_id":"257333","corporate_editor":["Institute of Electrical and Electronics Engineers (IEEE)"],"main_file_link":[{"open_access":"1"}]},{"type":"conference_abstract","project":[{"_id":"beb248c8-cd75-11ed-b77c-e432b4711f7b","name":"Institut für Systemdynamik und Mechatronik"}],"user_id":"242294","publication_status":"accepted","department":[{"_id":"103"}],"title":"Cognitive Edge Computing for Multi-Sensor Applications with Sparse Data and High Latency Requirements","date_created":"2025-07-24T17:02:56Z","year":"2025","_id":"6077","language":[{"iso":"eng"}],"place":"Bielefeld","citation":{"chicago":"Leuering, Julien, Farjana Jalil, Qazi Arbab Ahmed, Wolfram Schenck, and Thorsten Jungeblut. “Cognitive Edge Computing for Multi-Sensor Applications with Sparse Data and High Latency Requirements.” Bielefeld: Institute for Data Science Solutions, n.d.","short":"J. Leuering, F. Jalil, Q.A. Ahmed, W. Schenck, T. Jungeblut, in: Institute for Data Science Solutions, Bielefeld, n.d.","ama":"Leuering J, Jalil F, Ahmed QA, Schenck W, Jungeblut T. Cognitive Edge Computing for Multi-Sensor Applications with Sparse Data and High Latency Requirements. In: Bielefeld: Institute for Data Science Solutions.","mla":"Leuering, Julien, et al. <i>Cognitive Edge Computing for Multi-Sensor Applications with Sparse Data and High Latency Requirements</i>. Institute for Data Science Solutions.","ieee":"J. Leuering, F. Jalil, Q. A. Ahmed, W. Schenck, and T. Jungeblut, “Cognitive Edge Computing for Multi-Sensor Applications with Sparse Data and High Latency Requirements,” presented at the KI und ihre Anwendungen – Aktuelle Forschungsarbeiten des wissenschaftlichen Nachwuchses, Bielefeld.","bibtex":"@inproceedings{Leuering_Jalil_Ahmed_Schenck_Jungeblut, place={Bielefeld}, title={Cognitive Edge Computing for Multi-Sensor Applications with Sparse Data and High Latency Requirements}, publisher={Institute for Data Science Solutions}, author={Leuering, Julien and Jalil, Farjana and Ahmed, Qazi Arbab and Schenck, Wolfram and Jungeblut, Thorsten} }","apa":"Leuering, J., Jalil, F., Ahmed, Q. A., Schenck, W., &#38; Jungeblut, T. (n.d.). Cognitive Edge Computing for Multi-Sensor Applications with Sparse Data and High Latency Requirements. Presented at the KI und ihre Anwendungen – Aktuelle Forschungsarbeiten des wissenschaftlichen Nachwuchses, Bielefeld: Institute for Data Science Solutions.","alphadin":"<span style=\"font-variant:small-caps;\">Leuering, Julien</span> ; <span style=\"font-variant:small-caps;\">Jalil, Farjana</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Schenck, Wolfram</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: Cognitive Edge Computing for Multi-Sensor Applications with Sparse Data and High Latency Requirements. In: . Bielefeld : Institute for Data Science Solutions"},"author":[{"first_name":"Julien","id":"260749","last_name":"Leuering","orcid":"0000-0001-7101-378X","full_name":"Leuering, Julien"},{"last_name":"Jalil","full_name":"Jalil, Farjana","first_name":"Farjana","id":"260919"},{"orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab","last_name":"Ahmed","first_name":"Qazi Arbab","id":"257333"},{"first_name":"Wolfram","id":"224375","orcid":"0000-0003-3300-2048","full_name":"Schenck, Wolfram","last_name":"Schenck"},{"first_name":"Thorsten","id":"242294","last_name":"Jungeblut","orcid":"0000-0001-7425-8766","full_name":"Jungeblut, Thorsten"}],"conference":{"name":"KI und ihre Anwendungen – Aktuelle Forschungsarbeiten des wissenschaftlichen Nachwuchses","location":"Bielefeld","start_date":"2025-06-03","end_date":"2025-06-03"},"status":"public","publisher":"Institute for Data Science Solutions","date_updated":"2026-03-17T15:29:26Z"},{"user_id":"257333","project":[{"name":"Institut für Systemdynamik und Mechatronik","_id":"beb248c8-cd75-11ed-b77c-e432b4711f7b"}],"type":"conference_abstract","department":[{"_id":"103"}],"date_created":"2025-07-27T12:34:10Z","title":"NNXC: Neural Network Meets Approximate Computing","language":[{"iso":"eng"}],"_id":"6080","year":"2025","status":"public","conference":{"name":"KI und ihre Anwendungen – Aktuelle Forschungsarbeiten des wissenschaftlichen Nachwuchses","location":"Bielefeld","end_date":"2025-06-03","start_date":"2025-06-03"},"citation":{"ama":"Jalil F, Leuering J, Ahmed QA, Schenck W, Jungeblut T. NNXC: Neural Network Meets Approximate Computing. In: Bielefeld:  Institute for Data Science Solutions; 2025.","mla":"Jalil, Farjana, et al. <i>NNXC: Neural Network Meets Approximate Computing</i>.  Institute for Data Science Solutions, 2025.","short":"F. Jalil, J. Leuering, Q.A. Ahmed, W. Schenck, T. Jungeblut, in:  Institute for Data Science Solutions, Bielefeld, 2025.","chicago":"Jalil, Farjana, Julien Leuering, Qazi Arbab Ahmed, Wolfram Schenck, and Thorsten Jungeblut. “NNXC: Neural Network Meets Approximate Computing.” Bielefeld:  Institute for Data Science Solutions, 2025.","apa":"Jalil, F., Leuering, J., Ahmed, Q. A., Schenck, W., &#38; Jungeblut, T. (2025). NNXC: Neural Network Meets Approximate Computing. Presented at the KI und ihre Anwendungen – Aktuelle Forschungsarbeiten des wissenschaftlichen Nachwuchses, Bielefeld:  Institute for Data Science Solutions.","bibtex":"@inproceedings{Jalil_Leuering_Ahmed_Schenck_Jungeblut_2025, place={Bielefeld}, title={NNXC: Neural Network Meets Approximate Computing}, publisher={ Institute for Data Science Solutions}, author={Jalil, Farjana and Leuering, Julien and Ahmed, Qazi Arbab and Schenck, Wolfram and Jungeblut, Thorsten}, year={2025} }","alphadin":"<span style=\"font-variant:small-caps;\">Jalil, Farjana</span> ; <span style=\"font-variant:small-caps;\">Leuering, Julien</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Schenck, Wolfram</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: NNXC: Neural Network Meets Approximate Computing. In: . Bielefeld :  Institute for Data Science Solutions, 2025","ieee":"F. Jalil, J. Leuering, Q. A. Ahmed, W. Schenck, and T. Jungeblut, “NNXC: Neural Network Meets Approximate Computing,” presented at the KI und ihre Anwendungen – Aktuelle Forschungsarbeiten des wissenschaftlichen Nachwuchses, Bielefeld, 2025."},"author":[{"full_name":"Jalil, Farjana","last_name":"Jalil","first_name":"Farjana","id":"260919"},{"first_name":"Julien","id":"260749","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7101-378X/work/198206660","orcid":"0000-0001-7101-378X","full_name":"Leuering, Julien","last_name":"Leuering"},{"first_name":"Qazi Arbab","id":"257333","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/188693619","last_name":"Ahmed","orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab"},{"last_name":"Schenck","orcid":"0000-0003-3300-2048","full_name":"Schenck, Wolfram","first_name":"Wolfram","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0003-3300-2048/work/188693620","id":"224375"},{"full_name":"Jungeblut, Thorsten","orcid":"0000-0001-7425-8766","last_name":"Jungeblut","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/188693621","id":"242294","first_name":"Thorsten"}],"place":"Bielefeld","date_updated":"2026-03-17T15:29:26Z","publisher":" Institute for Data Science Solutions"},{"place":"Bielefeld","author":[{"last_name":"Jalil","full_name":"Jalil, Farjana","first_name":"Farjana","id":"260919"},{"full_name":"Leuering, Julien","orcid":"0000-0001-7101-378X","last_name":"Leuering","id":"260749","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7101-378X/work/196708129","first_name":"Julien"},{"first_name":"Qazi Arbab","id":"257333","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/188693899","last_name":"Ahmed","orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab"},{"last_name":"Schenck","full_name":"Schenck, Wolfram","orcid":"0000-0003-3300-2048","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0003-3300-2048/work/188693900","id":"224375","first_name":"Wolfram"},{"orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/188693901","id":"242294","first_name":"Thorsten","full_name":"Jungeblut, Thorsten","orcid":"0000-0001-7425-8766","last_name":"Jungeblut"}],"citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Jalil, Farjana</span> ; <span style=\"font-variant:small-caps;\">Leuering, Julien</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Schenck, Wolfram</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: AutoDSE: Towards HW/AI Co-design of Ultra-low Latency Hardware Accelerators for Industrial Applications. In: <i>Workshop on AI and its Applications</i>. Bielefeld : Institute for Data Science Solutions, 2025","apa":"Jalil, F., Leuering, J., Ahmed, Q. A., Schenck, W., &#38; Jungeblut, T. (2025). AutoDSE: Towards HW/AI Co-design of Ultra-low Latency Hardware Accelerators for Industrial Applications. In <i>Workshop on AI and its Applications</i>. Bielefeld: Institute for Data Science Solutions. <a href=\"https://doi.org/10.60802/sidas.2025.2\">https://doi.org/10.60802/sidas.2025.2</a>","bibtex":"@inproceedings{Jalil_Leuering_Ahmed_Schenck_Jungeblut_2025, place={Bielefeld}, title={AutoDSE: Towards HW/AI Co-design of Ultra-low Latency Hardware Accelerators for Industrial Applications}, DOI={<a href=\"https://doi.org/10.60802/sidas.2025.2\">10.60802/sidas.2025.2</a>}, booktitle={Workshop on AI and its Applications}, publisher={Institute for Data Science Solutions}, author={Jalil, Farjana and Leuering, Julien and Ahmed, Qazi Arbab and Schenck, Wolfram and Jungeblut, Thorsten}, year={2025} }","ieee":"F. Jalil, J. Leuering, Q. A. Ahmed, W. Schenck, and T. Jungeblut, “AutoDSE: Towards HW/AI Co-design of Ultra-low Latency Hardware Accelerators for Industrial Applications,” in <i>Workshop on AI and its Applications</i>, Bielefeld, 2025.","mla":"Jalil, Farjana, et al. “AutoDSE: Towards HW/AI Co-Design of Ultra-Low Latency Hardware Accelerators for Industrial Applications.” <i>Workshop on AI and Its Applications</i>, Institute for Data Science Solutions, 2025, doi:<a href=\"https://doi.org/10.60802/sidas.2025.2\">10.60802/sidas.2025.2</a>.","ama":"Jalil F, Leuering J, Ahmed QA, Schenck W, Jungeblut T. AutoDSE: Towards HW/AI Co-design of Ultra-low Latency Hardware Accelerators for Industrial Applications. In: <i>Workshop on AI and Its Applications</i>. Bielefeld: Institute for Data Science Solutions; 2025. doi:<a href=\"https://doi.org/10.60802/sidas.2025.2\">10.60802/sidas.2025.2</a>","chicago":"Jalil, Farjana, Julien Leuering, Qazi Arbab Ahmed, Wolfram Schenck, and Thorsten Jungeblut. “AutoDSE: Towards HW/AI Co-Design of Ultra-Low Latency Hardware Accelerators for Industrial Applications.” In <i>Workshop on AI and Its Applications</i>. Bielefeld: Institute for Data Science Solutions, 2025. <a href=\"https://doi.org/10.60802/sidas.2025.2\">https://doi.org/10.60802/sidas.2025.2</a>.","short":"F. Jalil, J. Leuering, Q.A. Ahmed, W. Schenck, T. Jungeblut, in: Workshop on AI and Its Applications, Institute for Data Science Solutions, Bielefeld, 2025."},"conference":{"name":"KI und ihre Anwendungen – Aktuelle Forschungsarbeiten des wissenschaftlichen Nachwuchses","location":"Bielefeld","end_date":"2025-06-03","start_date":"2025-06-03"},"status":"public","doi":"10.60802/sidas.2025.2","publisher":"Institute for Data Science Solutions","date_updated":"2026-03-17T15:29:26Z","year":"2025","_id":"6081","language":[{"iso":"eng"}],"department":[{"_id":"103"}],"title":"AutoDSE: Towards HW/AI Co-design of Ultra-low Latency Hardware Accelerators for Industrial Applications","date_created":"2025-07-27T12:47:20Z","type":"conference_abstract","project":[{"name":"Institut für Systemdynamik und Mechatronik","_id":"beb248c8-cd75-11ed-b77c-e432b4711f7b"}],"user_id":"242294","publication":"Workshop on AI and its Applications"},{"department":[{"_id":"103"}],"quality_controlled":"1","date_created":"2025-07-27T12:49:35Z","title":"From Fisheye to Fusion: Towards Efficient AI-based Indoor Perception for Public Transportation","user_id":"257895","project":[{"_id":"beb248c8-cd75-11ed-b77c-e432b4711f7b","name":"Institut für Systemdynamik und Mechatronik"}],"type":"conference_abstract","research_group":[{"_id":"f025f82c-c221-11ec-90a2-d82e18d06cb8","name":"CareTech OWL - Zentrum für Gesundheit, Soziales und Technologie"}],"publication":"Workshop on AI and its Applications","status":"public","conference":{"start_date":"2025-06-03","end_date":"2025-06-03","location":"Bielefeld","name":"Workshop on AI and its ApplKI und ihre Anwendungen – Aktuelle Forschungsarbeiten des wissenschaftlichen Nachwuchsesications"},"author":[{"last_name":"Wermuth","full_name":"Wermuth, Stella","orcid":"0009-0001-3498-527X","orcid_put_code_url":"https://api.orcid.org/v2.0/0009-0001-3498-527X/work/204064756","id":"257895","first_name":"Stella"},{"orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/188693940","id":"257333","first_name":"Qazi Arbab","full_name":"Ahmed, Qazi Arbab","orcid":"0000-0002-1837-2254","last_name":"Ahmed"},{"full_name":"Jungeblut, Thorsten","orcid":"0000-0001-7425-8766","last_name":"Jungeblut","id":"242294","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/188693941","first_name":"Thorsten"}],"citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Wermuth, Stella</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: From Fisheye to Fusion: Towards Efficient AI-based Indoor Perception for Public Transportation. In: <i>Workshop on AI and its Applications</i>. Bielefeld : Institute for Data Science Solutions, 2025","bibtex":"@inproceedings{Wermuth_Ahmed_Jungeblut_2025, place={Bielefeld}, title={From Fisheye to Fusion: Towards Efficient AI-based Indoor Perception for Public Transportation}, booktitle={Workshop on AI and its Applications}, publisher={Institute for Data Science Solutions}, author={Wermuth, Stella and Ahmed, Qazi Arbab and Jungeblut, Thorsten}, year={2025} }","apa":"Wermuth, S., Ahmed, Q. A., &#38; Jungeblut, T. (2025). From Fisheye to Fusion: Towards Efficient AI-based Indoor Perception for Public Transportation. In <i>Workshop on AI and its Applications</i>. Bielefeld: Institute for Data Science Solutions.","ieee":"S. Wermuth, Q. A. Ahmed, and T. Jungeblut, “From Fisheye to Fusion: Towards Efficient AI-based Indoor Perception for Public Transportation,” in <i>Workshop on AI and its Applications</i>, Bielefeld, 2025.","mla":"Wermuth, Stella, et al. “From Fisheye to Fusion: Towards Efficient AI-Based Indoor Perception for Public Transportation.” <i>Workshop on AI and Its Applications</i>, Institute for Data Science Solutions, 2025.","ama":"Wermuth S, Ahmed QA, Jungeblut T. From Fisheye to Fusion: Towards Efficient AI-based Indoor Perception for Public Transportation. In: <i>Workshop on AI and Its Applications</i>. Bielefeld: Institute for Data Science Solutions; 2025.","short":"S. Wermuth, Q.A. Ahmed, T. Jungeblut, in: Workshop on AI and Its Applications, Institute for Data Science Solutions, Bielefeld, 2025.","chicago":"Wermuth, Stella, Qazi Arbab Ahmed, and Thorsten Jungeblut. “From Fisheye to Fusion: Towards Efficient AI-Based Indoor Perception for Public Transportation.” In <i>Workshop on AI and Its Applications</i>. Bielefeld: Institute for Data Science Solutions, 2025."},"place":"Bielefeld","date_updated":"2026-03-17T15:29:26Z","publisher":"Institute for Data Science Solutions","language":[{"iso":"eng"}],"_id":"6082","year":"2025"},{"status":"public","conference":{"name":"KI und ihre Anwendungen – Aktuelle Forschungsarbeiten des wissenschaftlichen Nachwuchses","location":"Bielefeld","start_date":"2025-06-03","end_date":"2025-06-03"},"citation":{"chicago":"Köse, Mohammad Ibrahim, Qazi Arbab Ahmed, and Thorsten Jungeblut. “Edge4OD: An Automated Framework for Efficient Execution of Object Detection Algorithms on Edge Devices.” Bielefeld: Institute for Data Science Solutions, 2025. <a href=\"https://doi.org/10.60802/sidas.2025.2\">https://doi.org/10.60802/sidas.2025.2</a>.","short":"M.I. Köse, Q.A. Ahmed, T. Jungeblut, in: Institute for Data Science Solutions, Bielefeld, 2025.","ama":"Köse MI, Ahmed QA, Jungeblut T. Edge4OD: An Automated Framework for Efficient Execution of Object Detection Algorithms on Edge Devices. In: Bielefeld: Institute for Data Science Solutions; 2025. doi:<a href=\"https://doi.org/10.60802/sidas.2025.2\">10.60802/sidas.2025.2</a>","mla":"Köse, Mohammad Ibrahim, et al. <i>Edge4OD: An Automated Framework for Efficient Execution of Object Detection Algorithms on Edge Devices</i>. Institute for Data Science Solutions, 2025, doi:<a href=\"https://doi.org/10.60802/sidas.2025.2\">10.60802/sidas.2025.2</a>.","ieee":"M. I. Köse, Q. A. Ahmed, and T. Jungeblut, “Edge4OD: An Automated Framework for Efficient Execution of Object Detection Algorithms on Edge Devices,” presented at the KI und ihre Anwendungen – Aktuelle Forschungsarbeiten des wissenschaftlichen Nachwuchses, Bielefeld, 2025.","apa":"Köse, M. I., Ahmed, Q. A., &#38; Jungeblut, T. (2025). Edge4OD: An Automated Framework for Efficient Execution of Object Detection Algorithms on Edge Devices. Presented at the KI und ihre Anwendungen – Aktuelle Forschungsarbeiten des wissenschaftlichen Nachwuchses, Bielefeld: Institute for Data Science Solutions. <a href=\"https://doi.org/10.60802/sidas.2025.2\">https://doi.org/10.60802/sidas.2025.2</a>","bibtex":"@inproceedings{Köse_Ahmed_Jungeblut_2025, place={Bielefeld}, title={Edge4OD: An Automated Framework for Efficient Execution of Object Detection Algorithms on Edge Devices}, DOI={<a href=\"https://doi.org/10.60802/sidas.2025.2\">10.60802/sidas.2025.2</a>}, publisher={Institute for Data Science Solutions}, author={Köse, Mohammad Ibrahim and Ahmed, Qazi Arbab and Jungeblut, Thorsten}, year={2025} }","alphadin":"<span style=\"font-variant:small-caps;\">Köse, Mohammad Ibrahim</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: Edge4OD: An Automated Framework for Efficient Execution of Object Detection Algorithms on Edge Devices. In: . Bielefeld : Institute for Data Science Solutions, 2025"},"author":[{"first_name":"Mohammad Ibrahim","last_name":"Köse","full_name":"Köse, Mohammad Ibrahim"},{"first_name":"Qazi Arbab","id":"257333","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/188693985","orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab","last_name":"Ahmed"},{"first_name":"Thorsten","id":"242294","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/188693986","orcid":"0000-0001-7425-8766","full_name":"Jungeblut, Thorsten","last_name":"Jungeblut"}],"place":"Bielefeld","date_updated":"2026-03-17T15:29:26Z","publisher":"Institute for Data Science Solutions","doi":"10.60802/sidas.2025.2","language":[{"iso":"eng"}],"_id":"6083","year":"2025","department":[{"_id":"103"}],"date_created":"2025-07-27T12:52:42Z","title":"Edge4OD: An Automated Framework for Efficient Execution of Object Detection Algorithms on Edge Devices","user_id":"257333","project":[{"name":"Institut für Systemdynamik und Mechatronik","_id":"beb248c8-cd75-11ed-b77c-e432b4711f7b"}],"type":"conference_abstract"},{"department":[{"_id":"103"}],"date_created":"2025-08-20T10:50:06Z","title":"DNA: detecting early signs of neurodegenerative diseases through activity and sleep analysis","volume":19,"project":[{"name":"Institut für Systemdynamik und Mechatronik","_id":"beb248c8-cd75-11ed-b77c-e432b4711f7b"}],"publication_identifier":{"eissn":["1662-453X"]},"type":"journal_article","alternative_id":["6354"],"user_id":"254998","research_group":[{"name":"CareTech OWL - Zentrum für Gesundheit, Soziales und Technologie","_id":"f025f82c-c221-11ec-90a2-d82e18d06cb8"}],"publication_status":"published","publication":"Frontiers in Neuroscience","citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Attaullah, Hasina</span> ; <span style=\"font-variant:small-caps;\">Sanaullah, Sanaullah</span> ; <span style=\"font-variant:small-caps;\">Peters, Annika</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Baudisch, Justin</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span>: DNA: detecting early signs of neurodegenerative diseases through activity and sleep analysis. In: <i>Frontiers in Neuroscience</i> Bd. 19, Frontiers Media SA (2025)","bibtex":"@article{Attaullah_Sanaullah_Peters_Ahmed_Baudisch_Jungeblut_2025, title={DNA: detecting early signs of neurodegenerative diseases through activity and sleep analysis}, volume={19}, DOI={<a href=\"https://doi.org/10.3389/fnins.2025.1617758\">10.3389/fnins.2025.1617758</a>}, journal={Frontiers in Neuroscience}, publisher={Frontiers Media SA}, author={Attaullah, Hasina and Sanaullah, Sanaullah and Peters, Annika and Ahmed, Qazi Arbab and Baudisch, Justin and Jungeblut, Thorsten}, year={2025} }","apa":"Attaullah, H., Sanaullah, S., Peters, A., Ahmed, Q. A., Baudisch, J., &#38; Jungeblut, T. (2025). DNA: detecting early signs of neurodegenerative diseases through activity and sleep analysis. <i>Frontiers in Neuroscience</i>, <i>19</i>. <a href=\"https://doi.org/10.3389/fnins.2025.1617758\">https://doi.org/10.3389/fnins.2025.1617758</a>","ieee":"H. Attaullah, S. Sanaullah, A. Peters, Q. A. Ahmed, J. Baudisch, and T. Jungeblut, “DNA: detecting early signs of neurodegenerative diseases through activity and sleep analysis,” <i>Frontiers in Neuroscience</i>, vol. 19, 2025.","mla":"Attaullah, Hasina, et al. “DNA: Detecting Early Signs of Neurodegenerative Diseases through Activity and Sleep Analysis.” <i>Frontiers in Neuroscience</i>, vol. 19, Frontiers Media SA, 2025, doi:<a href=\"https://doi.org/10.3389/fnins.2025.1617758\">10.3389/fnins.2025.1617758</a>.","ama":"Attaullah H, Sanaullah S, Peters A, Ahmed QA, Baudisch J, Jungeblut T. DNA: detecting early signs of neurodegenerative diseases through activity and sleep analysis. <i>Frontiers in Neuroscience</i>. 2025;19. doi:<a href=\"https://doi.org/10.3389/fnins.2025.1617758\">10.3389/fnins.2025.1617758</a>","chicago":"Attaullah, Hasina, Sanaullah Sanaullah, Annika Peters, Qazi Arbab Ahmed, Justin Baudisch, and Thorsten Jungeblut. “DNA: Detecting Early Signs of Neurodegenerative Diseases through Activity and Sleep Analysis.” <i>Frontiers in Neuroscience</i> 19 (2025). <a href=\"https://doi.org/10.3389/fnins.2025.1617758\">https://doi.org/10.3389/fnins.2025.1617758</a>.","short":"H. Attaullah, S. Sanaullah, A. Peters, Q.A. Ahmed, J. Baudisch, T. Jungeblut, Frontiers in Neuroscience 19 (2025)."},"author":[{"full_name":"Attaullah, Hasina","orcid":"0000-0002-6902-6116","last_name":"Attaullah","id":"254998","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-6902-6116/work/190160459","first_name":"Hasina"},{"first_name":"Sanaullah","id":"248865","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0003-4112-802X/work/190160461","last_name":"Sanaullah","orcid":"0000-0003-4112-802X","full_name":"Sanaullah, Sanaullah"},{"last_name":"Peters","full_name":"Peters, Annika","first_name":"Annika","id":"257172"},{"orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/190160462","id":"257333","first_name":"Qazi Arbab","full_name":"Ahmed, Qazi Arbab","orcid":"0000-0002-1837-2254","last_name":"Ahmed"},{"first_name":"Justin","id":"247397","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-5565-0228/work/190160463","orcid":"0000-0001-5565-0228","full_name":"Baudisch, Justin","last_name":"Baudisch"},{"full_name":"Jungeblut, Thorsten","orcid":"0000-0001-7425-8766","last_name":"Jungeblut","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/190160465","id":"242294","first_name":"Thorsten"}],"status":"public","doi":"10.3389/fnins.2025.1617758","intvolume":"        19","date_updated":"2026-03-17T15:29:26Z","publisher":"Frontiers Media SA","_id":"6139","year":"2025","language":[{"iso":"eng"}]},{"year":"2025","_id":"6140","language":[{"iso":"eng"}],"doi":"10.48550/ARXIV.2508.06340","publisher":"arXiv","date_updated":"2026-03-17T15:29:26Z","citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Mughal, Danish Mehmood</span> ; <span style=\"font-variant:small-caps;\">Munir, Daniyal</span> ; <span style=\"font-variant:small-caps;\">Schotten, Hans D.</span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span> ; <span style=\"font-variant:small-caps;\">Kim, Sang-Hyo</span> ; <span style=\"font-variant:small-caps;\">Chung, Min Young</span>: MALRIS: Malicious Hardware in RIS-Assisted Wireless Communications. In:  : arXiv, 2025","bibtex":"@inproceedings{Ahmed_Mughal_Munir_Schotten_Jungeblut_Kim_Chung_2025, title={MALRIS: Malicious Hardware in RIS-Assisted Wireless Communications}, DOI={<a href=\"https://doi.org/10.48550/ARXIV.2508.06340\">10.48550/ARXIV.2508.06340</a>}, publisher={arXiv}, author={Ahmed, Qazi Arbab and Mughal, Danish Mehmood and Munir, Daniyal and Schotten, Hans D. and Jungeblut, Thorsten and Kim, Sang-Hyo and Chung, Min Young}, year={2025} }","apa":"Ahmed, Q. A., Mughal, D. M., Munir, D., Schotten, H. D., Jungeblut, T., Kim, S.-H., &#38; Chung, M. Y. (2025). MALRIS: Malicious Hardware in RIS-Assisted Wireless Communications. Presented at the IEEE CSCN 2025, Bologna Italy: arXiv. <a href=\"https://doi.org/10.48550/ARXIV.2508.06340\">https://doi.org/10.48550/ARXIV.2508.06340</a>","ieee":"Q. A. Ahmed <i>et al.</i>, “MALRIS: Malicious Hardware in RIS-Assisted Wireless Communications,” presented at the IEEE CSCN 2025, Bologna Italy, 2025.","mla":"Ahmed, Qazi Arbab, et al. <i>MALRIS: Malicious Hardware in RIS-Assisted Wireless Communications</i>. arXiv, 2025, doi:<a href=\"https://doi.org/10.48550/ARXIV.2508.06340\">10.48550/ARXIV.2508.06340</a>.","ama":"Ahmed QA, Mughal DM, Munir D, et al. MALRIS: Malicious Hardware in RIS-Assisted Wireless Communications. In: arXiv; 2025. doi:<a href=\"https://doi.org/10.48550/ARXIV.2508.06340\">10.48550/ARXIV.2508.06340</a>","short":"Q.A. Ahmed, D.M. Mughal, D. Munir, H.D. Schotten, T. Jungeblut, S.-H. Kim, M.Y. Chung, in: arXiv, 2025.","chicago":"Ahmed, Qazi Arbab, Danish Mehmood Mughal, Daniyal Munir, Hans D. Schotten, Thorsten Jungeblut, Sang-Hyo Kim, and Min Young Chung. “MALRIS: Malicious Hardware in RIS-Assisted Wireless Communications.” arXiv, 2025. <a href=\"https://doi.org/10.48550/ARXIV.2508.06340\">https://doi.org/10.48550/ARXIV.2508.06340</a>."},"author":[{"last_name":"Ahmed","orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab","first_name":"Qazi Arbab","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/190160555","id":"257333"},{"last_name":"Mughal","full_name":"Mughal, Danish Mehmood","first_name":"Danish Mehmood"},{"first_name":"Daniyal","last_name":"Munir","full_name":"Munir, Daniyal"},{"full_name":"Schotten, Hans D.","last_name":"Schotten","first_name":"Hans D."},{"first_name":"Thorsten","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/190160556","id":"242294","last_name":"Jungeblut","orcid":"0000-0001-7425-8766","full_name":"Jungeblut, Thorsten"},{"first_name":"Sang-Hyo","full_name":"Kim, Sang-Hyo","last_name":"Kim"},{"first_name":"Min Young","last_name":"Chung","full_name":"Chung, Min Young"}],"conference":{"end_date":"2025-09-17","start_date":"2025-09-15","location":"Bologna Italy","name":"IEEE CSCN 2025"},"status":"public","publication_status":"published","type":"conference","project":[{"_id":"beb248c8-cd75-11ed-b77c-e432b4711f7b","name":"Institut für Systemdynamik und Mechatronik"}],"user_id":"257333","title":"MALRIS: Malicious Hardware in RIS-Assisted Wireless Communications","date_created":"2025-08-20T10:52:24Z","department":[{"_id":"103"}]},{"language":[{"iso":"eng"}],"_id":"5051","year":"2024","date_updated":"2026-03-17T15:29:13Z","page":"79-93","publisher":"Springer Science and Business Media LLC","doi":"10.1007/s41635-024-00147-5","intvolume":"         8","status":"public","citation":{"chicago":"Ahmed, Qazi Arbab, Tobias Wiersema, and Marco Platzner. “Post-Configuration Activation of Hardware Trojans in FPGAs.” <i>Journal of Hardware and Systems Security</i> 8, no. 2 (2024): 79–93. <a href=\"https://doi.org/10.1007/s41635-024-00147-5\">https://doi.org/10.1007/s41635-024-00147-5</a>.","short":"Q.A. Ahmed, T. Wiersema, M. Platzner, Journal of Hardware and Systems Security 8 (2024) 79–93.","mla":"Ahmed, Qazi Arbab, et al. “Post-Configuration Activation of Hardware Trojans in FPGAs.” <i>Journal of Hardware and Systems Security</i>, vol. 8, no. 2, Springer Science and Business Media LLC, 2024, pp. 79–93, doi:<a href=\"https://doi.org/10.1007/s41635-024-00147-5\">10.1007/s41635-024-00147-5</a>.","ama":"Ahmed QA, Wiersema T, Platzner M. Post-configuration Activation of Hardware Trojans in FPGAs. <i>Journal of Hardware and Systems Security</i>. 2024;8(2):79-93. doi:<a href=\"https://doi.org/10.1007/s41635-024-00147-5\">10.1007/s41635-024-00147-5</a>","ieee":"Q. A. Ahmed, T. Wiersema, and M. Platzner, “Post-configuration Activation of Hardware Trojans in FPGAs,” <i>Journal of Hardware and Systems Security</i>, vol. 8, no. 2, pp. 79–93, 2024.","alphadin":"<span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Wiersema, Tobias</span> ; <span style=\"font-variant:small-caps;\">Platzner, Marco</span>: Post-configuration Activation of Hardware Trojans in FPGAs. In: <i>Journal of Hardware and Systems Security</i> Bd. 8, Springer Science and Business Media LLC (2024), Nr. 2, S. 79–93","apa":"Ahmed, Q. A., Wiersema, T., &#38; Platzner, M. (2024). Post-configuration Activation of Hardware Trojans in FPGAs. <i>Journal of Hardware and Systems Security</i>, <i>8</i>(2), 79–93. <a href=\"https://doi.org/10.1007/s41635-024-00147-5\">https://doi.org/10.1007/s41635-024-00147-5</a>","bibtex":"@article{Ahmed_Wiersema_Platzner_2024, title={Post-configuration Activation of Hardware Trojans in FPGAs}, volume={8}, DOI={<a href=\"https://doi.org/10.1007/s41635-024-00147-5\">10.1007/s41635-024-00147-5</a>}, number={2}, journal={Journal of Hardware and Systems Security}, publisher={Springer Science and Business Media LLC}, author={Ahmed, Qazi Arbab and Wiersema, Tobias and Platzner, Marco}, year={2024}, pages={79–93} }"},"author":[{"first_name":"Qazi Arbab","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169760864","id":"257333","last_name":"Ahmed","orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab"},{"first_name":"Tobias","last_name":"Wiersema","full_name":"Wiersema, Tobias"},{"first_name":"Marco","last_name":"Platzner","full_name":"Platzner, Marco"}],"issue":"2","publication_status":"published","publication":"Journal of Hardware and Systems Security","user_id":"220548","publication_identifier":{"issn":["2509-3428"],"eissn":["2509-3436"]},"type":"journal_article","volume":8,"date_created":"2024-10-17T12:40:30Z","title":"Post-configuration Activation of Hardware Trojans in FPGAs"},{"citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Sadeghi-Kohan, Somayeh </span> ; <span style=\"font-variant:small-caps;\">Awais, Muhammad </span> ; <span style=\"font-variant:small-caps;\">Platzner, Marco</span> ; <span style=\"font-variant:small-caps;\">Hellebrand, Sybille </span> ; <span style=\"font-variant:small-caps;\">Jungeblut, Thorsten</span> ; <span style=\"font-variant:small-caps;\">Wunderlich, Hans-Joachim </span>: RelaX: Reliability Assessment in Approximate Circuits. In: , 2024","bibtex":"@inproceedings{Ahmed_Sadeghi-Kohan_Awais_Platzner_Hellebrand_Jungeblut_Wunderlich_2024, title={RelaX: Reliability Assessment in Approximate Circuits}, author={Ahmed, Qazi Arbab and Sadeghi-Kohan, Somayeh  and Awais, Muhammad  and Platzner, Marco and Hellebrand, Sybille  and Jungeblut, Thorsten and Wunderlich, Hans-Joachim }, year={2024} }","apa":"Ahmed, Q. A., Sadeghi-Kohan, S., Awais, M., Platzner, M., Hellebrand, S., Jungeblut, T., &#38; Wunderlich, H.-J. (2024). RelaX: Reliability Assessment in Approximate Circuits. Presented at the The 9th Workshop on Approximate Computing, 2024 ACM/IEEE International Conference on Computer-Aided Design, New Jersey, USA.","ieee":"Q. A. Ahmed <i>et al.</i>, “RelaX: Reliability Assessment in Approximate Circuits,” presented at the The 9th Workshop on Approximate Computing, 2024 ACM/IEEE International Conference on Computer-Aided Design, New Jersey, USA, 2024.","mla":"Ahmed, Qazi Arbab, et al. <i>RelaX: Reliability Assessment in Approximate Circuits</i>. 2024.","ama":"Ahmed QA, Sadeghi-Kohan S, Awais M, et al. RelaX: Reliability Assessment in Approximate Circuits. In: ; 2024.","chicago":"Ahmed, Qazi Arbab, Somayeh  Sadeghi-Kohan, Muhammad  Awais, Marco Platzner, Sybille  Hellebrand, Thorsten Jungeblut, and Hans-Joachim  Wunderlich. “RelaX: Reliability Assessment in Approximate Circuits,” 2024.","short":"Q.A. Ahmed, S. Sadeghi-Kohan, M. Awais, M. Platzner, S. Hellebrand, T. Jungeblut, H.-J. Wunderlich, in: 2024."},"author":[{"first_name":"Qazi Arbab","id":"257333","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169760795","last_name":"Ahmed","orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab"},{"full_name":"Sadeghi-Kohan, Somayeh ","last_name":"Sadeghi-Kohan","first_name":"Somayeh "},{"full_name":"Awais, Muhammad ","last_name":"Awais","first_name":"Muhammad "},{"full_name":"Platzner, Marco","last_name":"Platzner","first_name":"Marco"},{"full_name":"Hellebrand, Sybille ","last_name":"Hellebrand","first_name":"Sybille "},{"last_name":"Jungeblut","full_name":"Jungeblut, Thorsten","orcid":"0000-0001-7425-8766","id":"242294","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0001-7425-8766/work/169760798","first_name":"Thorsten"},{"last_name":"Wunderlich","full_name":"Wunderlich, Hans-Joachim ","first_name":"Hans-Joachim "}],"status":"public","conference":{"location":"New Jersey, USA","name":"The 9th Workshop on Approximate Computing, 2024 ACM/IEEE International Conference on Computer-Aided Design","end_date":"2024-10-31","start_date":"2024-10-27"},"date_updated":"2026-03-17T15:29:13Z","_id":"5061","year":"2024","language":[{"iso":"eng"}],"date_created":"2024-10-17T12:54:19Z","title":"RelaX: Reliability Assessment in Approximate Circuits","oa":"1","type":"conference","main_file_link":[{"open_access":"1"}],"user_id":"257333","urn":"urn:nbn:de:hbz:bi10-50618"},{"language":[{"iso":"eng"}],"_id":"5052","year":"2023","article_number":"e0289672","status":"public","author":[{"first_name":"Muhammad","full_name":"Irfan, Muhammad","last_name":"Irfan"},{"first_name":"Nasir","last_name":"Ayub","full_name":"Ayub, Nasir"},{"last_name":"Althobiani","full_name":"Althobiani, Faisal","first_name":"Faisal"},{"full_name":"Masood, Sabeen","last_name":"Masood","first_name":"Sabeen"},{"first_name":"Qazi Arbab","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169761539","id":"257333","orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab","last_name":"Ahmed"},{"full_name":"Saeed, Muhammad Hamza","last_name":"Saeed","first_name":"Muhammad Hamza"},{"first_name":"Saifur","full_name":"Rahman, Saifur","last_name":"Rahman"},{"first_name":"Hesham","full_name":"Abdushkour, Hesham","last_name":"Abdushkour"},{"first_name":"Mohammad E.","last_name":"Gommosani","full_name":"Gommosani, Mohammad E."},{"last_name":"Shamji","full_name":"Shamji, V. R.","first_name":"V. R."},{"first_name":"Salim Nasar","full_name":"Faraj Mursal, Salim Nasar","last_name":"Faraj Mursal"}],"citation":{"mla":"Irfan, Muhammad, et al. “Ensemble Learning Approach for Advanced Metering Infrastructure in Future Smart Grids.” <i>PLOS ONE</i>, vol. 18, no. 10, e0289672, Public Library of Science (PLoS), 2023, doi:<a href=\"https://doi.org/10.1371/journal.pone.0289672\">10.1371/journal.pone.0289672</a>.","ama":"Irfan M, Ayub N, Althobiani F, et al. Ensemble learning approach for advanced metering infrastructure in future smart grids. <i>PLOS ONE</i>. 2023;18(10). doi:<a href=\"https://doi.org/10.1371/journal.pone.0289672\">10.1371/journal.pone.0289672</a>","short":"M. Irfan, N. Ayub, F. Althobiani, S. Masood, Q.A. Ahmed, M.H. Saeed, S. Rahman, H. Abdushkour, M.E. Gommosani, V.R. Shamji, S.N. Faraj Mursal, PLOS ONE 18 (2023).","chicago":"Irfan, Muhammad, Nasir Ayub, Faisal Althobiani, Sabeen Masood, Qazi Arbab Ahmed, Muhammad Hamza Saeed, Saifur Rahman, et al. “Ensemble Learning Approach for Advanced Metering Infrastructure in Future Smart Grids.” <i>PLOS ONE</i> 18, no. 10 (2023). <a href=\"https://doi.org/10.1371/journal.pone.0289672\">https://doi.org/10.1371/journal.pone.0289672</a>.","alphadin":"<span style=\"font-variant:small-caps;\"><span style=\"font-variant:small-caps;\">Irfan, Muhammad</span> ; <span style=\"font-variant:small-caps;\">Ayub, Nasir</span> ; <span style=\"font-variant:small-caps;\">Althobiani, Faisal</span> ; <span style=\"font-variant:small-caps;\">Masood, Sabeen</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Saeed, Muhammad Hamza</span> ; <span style=\"font-variant:small-caps;\">Rahman, Saifur</span> ; <span style=\"font-variant:small-caps;\">Abdushkour, Hesham</span> ; u. a.</span>: Ensemble learning approach for advanced metering infrastructure in future smart grids. In: <i>PLOS ONE</i> Bd. 18, Public Library of Science (PLoS) (2023), Nr. 10","apa":"Irfan, M., Ayub, N., Althobiani, F., Masood, S., Ahmed, Q. A., Saeed, M. H., … Faraj Mursal, S. N. (2023). Ensemble learning approach for advanced metering infrastructure in future smart grids. <i>PLOS ONE</i>, <i>18</i>(10). <a href=\"https://doi.org/10.1371/journal.pone.0289672\">https://doi.org/10.1371/journal.pone.0289672</a>","bibtex":"@article{Irfan_Ayub_Althobiani_Masood_Ahmed_Saeed_Rahman_Abdushkour_Gommosani_Shamji_et al._2023, title={Ensemble learning approach for advanced metering infrastructure in future smart grids}, volume={18}, DOI={<a href=\"https://doi.org/10.1371/journal.pone.0289672\">10.1371/journal.pone.0289672</a>}, number={10e0289672}, journal={PLOS ONE}, publisher={Public Library of Science (PLoS)}, author={Irfan, Muhammad and Ayub, Nasir and Althobiani, Faisal and Masood, Sabeen and Ahmed, Qazi Arbab and Saeed, Muhammad Hamza and Rahman, Saifur and Abdushkour, Hesham and Gommosani, Mohammad E. and Shamji, V. R. and et al.}, year={2023} }","ieee":"M. Irfan <i>et al.</i>, “Ensemble learning approach for advanced metering infrastructure in future smart grids,” <i>PLOS ONE</i>, vol. 18, no. 10, 2023."},"date_updated":"2026-03-17T15:29:13Z","publisher":"Public Library of Science (PLoS)","doi":"10.1371/journal.pone.0289672","intvolume":"        18","alternative_id":["6076"],"user_id":"220548","publication_identifier":{"eissn":["1932-6203"]},"type":"journal_article","publication_status":"published","issue":"10","publication":"PLOS ONE","volume":18,"date_created":"2024-10-17T12:41:29Z","title":"Ensemble learning approach for advanced metering infrastructure in future smart grids"},{"doi":"10.1109/ISQED57927.2023.10129286","date_updated":"2026-03-17T15:29:13Z","publisher":"IEEE","page":"1-6","author":[{"first_name":"Qazi Arbab","id":"257333","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169761512","orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab","last_name":"Ahmed"},{"first_name":"Muhammad","last_name":"Awais","full_name":"Awais, Muhammad"},{"last_name":"Platzner","full_name":"Platzner, Marco","first_name":"Marco"}],"citation":{"ieee":"Q. A. Ahmed, M. Awais, and M. Platzner, “MAAS: Hiding Trojans in Approximate Circuits,” in <i>2023 24th International Symposium on Quality Electronic Design (ISQED)</i>, San Francisco, CA, USA, 2023, pp. 1–6.","alphadin":"<span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Awais, Muhammad</span> ; <span style=\"font-variant:small-caps;\">Platzner, Marco</span>: MAAS: Hiding Trojans in Approximate Circuits. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2023 24th International Symposium on Quality Electronic Design (ISQED)</i> : IEEE, 2023, S. 1–6","bibtex":"@inproceedings{Ahmed_Awais_Platzner_2023, title={MAAS: Hiding Trojans in Approximate Circuits}, DOI={<a href=\"https://doi.org/10.1109/ISQED57927.2023.10129286\">10.1109/ISQED57927.2023.10129286</a>}, booktitle={2023 24th International Symposium on Quality Electronic Design (ISQED)}, publisher={IEEE}, author={Ahmed, Qazi Arbab and Awais, Muhammad and Platzner, Marco}, editor={IEEEEditor}, year={2023}, pages={1–6} }","apa":"Ahmed, Q. A., Awais, M., &#38; Platzner, M. (2023). MAAS: Hiding Trojans in Approximate Circuits. In IEEE (Ed.), <i>2023 24th International Symposium on Quality Electronic Design (ISQED)</i> (pp. 1–6). San Francisco, CA, USA: IEEE. <a href=\"https://doi.org/10.1109/ISQED57927.2023.10129286\">https://doi.org/10.1109/ISQED57927.2023.10129286</a>","short":"Q.A. Ahmed, M. Awais, M. Platzner, in: IEEE (Ed.), 2023 24th International Symposium on Quality Electronic Design (ISQED), IEEE, 2023, pp. 1–6.","chicago":"Ahmed, Qazi Arbab, Muhammad Awais, and Marco Platzner. “MAAS: Hiding Trojans in Approximate Circuits.” In <i>2023 24th International Symposium on Quality Electronic Design (ISQED)</i>, edited by IEEE, 1–6. IEEE, 2023. <a href=\"https://doi.org/10.1109/ISQED57927.2023.10129286\">https://doi.org/10.1109/ISQED57927.2023.10129286</a>.","mla":"Ahmed, Qazi Arbab, et al. “MAAS: Hiding Trojans in Approximate Circuits.” <i>2023 24th International Symposium on Quality Electronic Design (ISQED)</i>, edited by IEEE, IEEE, 2023, pp. 1–6, doi:<a href=\"https://doi.org/10.1109/ISQED57927.2023.10129286\">10.1109/ISQED57927.2023.10129286</a>.","ama":"Ahmed QA, Awais M, Platzner M. MAAS: Hiding Trojans in Approximate Circuits. In: IEEE, ed. <i>2023 24th International Symposium on Quality Electronic Design (ISQED)</i>. IEEE; 2023:1-6. doi:<a href=\"https://doi.org/10.1109/ISQED57927.2023.10129286\">10.1109/ISQED57927.2023.10129286</a>"},"status":"public","conference":{"location":"San Francisco, CA, USA","name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","end_date":"2023-04-07","start_date":"2023-04-05"},"_id":"5053","year":"2023","language":[{"iso":"eng"}],"date_created":"2024-10-17T12:44:19Z","title":"MAAS: Hiding Trojans in Approximate Circuits","publication_status":"published","publication":"2023 24th International Symposium on Quality Electronic Design (ISQED)","publication_identifier":{"eisbn":["979-8-3503-3475-3"]},"type":"conference","corporate_editor":["IEEE"],"user_id":"220548"},{"type":"journal_article","publication_identifier":{"eissn":["2169-3536"]},"tmp":{"name":"Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)","image":"/images/cc_by_nc_nd.png","short":"CC BY-NC-ND (4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode"},"oa":"1","user_id":"220548","main_file_link":[{"open_access":"1"}],"publication_status":"published","publication":"IEEE Access","title":"Improved Learning-Based Design Space Exploration for Approximate Instance Generation","date_created":"2024-10-17T12:45:04Z","volume":11,"year":"2023","_id":"5054","language":[{"iso":"eng"}],"author":[{"full_name":"Rajput, Muhammad Awais","last_name":"Rajput","first_name":"Muhammad Awais"},{"last_name":"Alyami","full_name":"Alyami, Sultan","first_name":"Sultan"},{"orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169761504","id":"257333","first_name":"Qazi Arbab","full_name":"Ahmed, Qazi Arbab","orcid":"0000-0002-1837-2254","last_name":"Ahmed"},{"first_name":"Hani","last_name":"Alshahrani","full_name":"Alshahrani, Hani"},{"first_name":"Yousef","last_name":"Asiri","full_name":"Asiri, Yousef"},{"first_name":"Asadullah","last_name":"Shaikh","full_name":"Shaikh, Asadullah"}],"citation":{"mla":"Rajput, Muhammad Awais, et al. “Improved Learning-Based Design Space Exploration for Approximate Instance Generation.” <i>IEEE Access</i>, vol. 11, Institute of Electrical and Electronics Engineers (IEEE), 2023, pp. 18291–99, doi:<a href=\"https://doi.org/10.1109/ACCESS.2023.3247303\">10.1109/ACCESS.2023.3247303</a>.","ama":"Rajput MA, Alyami S, Ahmed QA, Alshahrani H, Asiri Y, Shaikh A. Improved Learning-Based Design Space Exploration for Approximate Instance Generation. <i>IEEE Access</i>. 2023;11:18291-18299. doi:<a href=\"https://doi.org/10.1109/ACCESS.2023.3247303\">10.1109/ACCESS.2023.3247303</a>","chicago":"Rajput, Muhammad Awais, Sultan Alyami, Qazi Arbab Ahmed, Hani Alshahrani, Yousef Asiri, and Asadullah Shaikh. “Improved Learning-Based Design Space Exploration for Approximate Instance Generation.” <i>IEEE Access</i> 11 (2023): 18291–99. <a href=\"https://doi.org/10.1109/ACCESS.2023.3247303\">https://doi.org/10.1109/ACCESS.2023.3247303</a>.","short":"M.A. Rajput, S. Alyami, Q.A. Ahmed, H. Alshahrani, Y. Asiri, A. Shaikh, IEEE Access 11 (2023) 18291–18299.","alphadin":"<span style=\"font-variant:small-caps;\">Rajput, Muhammad Awais</span> ; <span style=\"font-variant:small-caps;\">Alyami, Sultan</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Alshahrani, Hani</span> ; <span style=\"font-variant:small-caps;\">Asiri, Yousef</span> ; <span style=\"font-variant:small-caps;\">Shaikh, Asadullah</span>: Improved Learning-Based Design Space Exploration for Approximate Instance Generation. In: <i>IEEE Access</i> Bd. 11, Institute of Electrical and Electronics Engineers (IEEE) (2023), S. 18291–18299","apa":"Rajput, M. A., Alyami, S., Ahmed, Q. A., Alshahrani, H., Asiri, Y., &#38; Shaikh, A. (2023). Improved Learning-Based Design Space Exploration for Approximate Instance Generation. <i>IEEE Access</i>, <i>11</i>, 18291–18299. <a href=\"https://doi.org/10.1109/ACCESS.2023.3247303\">https://doi.org/10.1109/ACCESS.2023.3247303</a>","bibtex":"@article{Rajput_Alyami_Ahmed_Alshahrani_Asiri_Shaikh_2023, title={Improved Learning-Based Design Space Exploration for Approximate Instance Generation}, volume={11}, DOI={<a href=\"https://doi.org/10.1109/ACCESS.2023.3247303\">10.1109/ACCESS.2023.3247303</a>}, journal={IEEE Access}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Rajput, Muhammad Awais and Alyami, Sultan and Ahmed, Qazi Arbab and Alshahrani, Hani and Asiri, Yousef and Shaikh, Asadullah}, year={2023}, pages={18291–18299} }","ieee":"M. A. Rajput, S. Alyami, Q. A. Ahmed, H. Alshahrani, Y. Asiri, and A. Shaikh, “Improved Learning-Based Design Space Exploration for Approximate Instance Generation,” <i>IEEE Access</i>, vol. 11, pp. 18291–18299, 2023."},"status":"public","intvolume":"        11","doi":"10.1109/ACCESS.2023.3247303","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","page":"18291-18299","date_updated":"2026-03-17T15:29:13Z"},{"article_number":"1298","language":[{"iso":"eng"}],"year":"2023","_id":"5055","publisher":"MDPI AG","date_updated":"2026-03-17T15:29:13Z","intvolume":"        12","doi":"10.3390/electronics12061298","status":"public","citation":{"bibtex":"@article{Irfan_Ayub_Ahmed_Rahman_Bashir_Nowakowski_Alqhtani_Sieja_2023, title={AQSA: Aspect-Based Quality Sentiment Analysis for Multi-Labeling with Improved ResNet Hybrid Algorithm}, volume={12}, DOI={<a href=\"https://doi.org/10.3390/electronics12061298\">10.3390/electronics12061298</a>}, number={61298}, journal={Electronics}, publisher={MDPI AG}, author={Irfan, Muhammad and Ayub, Nasir and Ahmed, Qazi Arbab and Rahman, Saifur and Bashir, Muhammad Salman and Nowakowski, Grzegorz and Alqhtani, Samar M. and Sieja, Marek}, year={2023} }","apa":"Irfan, M., Ayub, N., Ahmed, Q. A., Rahman, S., Bashir, M. S., Nowakowski, G., … Sieja, M. (2023). AQSA: Aspect-Based Quality Sentiment Analysis for Multi-Labeling with Improved ResNet Hybrid Algorithm. <i>Electronics</i>, <i>12</i>(6). <a href=\"https://doi.org/10.3390/electronics12061298\">https://doi.org/10.3390/electronics12061298</a>","alphadin":"<span style=\"font-variant:small-caps;\">Irfan, Muhammad</span> ; <span style=\"font-variant:small-caps;\">Ayub, Nasir</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Rahman, Saifur</span> ; <span style=\"font-variant:small-caps;\">Bashir, Muhammad Salman</span> ; <span style=\"font-variant:small-caps;\">Nowakowski, Grzegorz</span> ; <span style=\"font-variant:small-caps;\">Alqhtani, Samar M.</span> ; <span style=\"font-variant:small-caps;\">Sieja, Marek</span>: AQSA: Aspect-Based Quality Sentiment Analysis for Multi-Labeling with Improved ResNet Hybrid Algorithm. In: <i>Electronics</i> Bd. 12, MDPI AG (2023), Nr. 6","ieee":"M. Irfan <i>et al.</i>, “AQSA: Aspect-Based Quality Sentiment Analysis for Multi-Labeling with Improved ResNet Hybrid Algorithm,” <i>Electronics</i>, vol. 12, no. 6, 2023.","ama":"Irfan M, Ayub N, Ahmed QA, et al. AQSA: Aspect-Based Quality Sentiment Analysis for Multi-Labeling with Improved ResNet Hybrid Algorithm. <i>Electronics</i>. 2023;12(6). doi:<a href=\"https://doi.org/10.3390/electronics12061298\">10.3390/electronics12061298</a>","mla":"Irfan, Muhammad, et al. “AQSA: Aspect-Based Quality Sentiment Analysis for Multi-Labeling with Improved ResNet Hybrid Algorithm.” <i>Electronics</i>, vol. 12, no. 6, 1298, MDPI AG, 2023, doi:<a href=\"https://doi.org/10.3390/electronics12061298\">10.3390/electronics12061298</a>.","short":"M. Irfan, N. Ayub, Q.A. Ahmed, S. Rahman, M.S. Bashir, G. Nowakowski, S.M. Alqhtani, M. Sieja, Electronics 12 (2023).","chicago":"Irfan, Muhammad, Nasir Ayub, Qazi Arbab Ahmed, Saifur Rahman, Muhammad Salman Bashir, Grzegorz Nowakowski, Samar M. Alqhtani, and Marek Sieja. “AQSA: Aspect-Based Quality Sentiment Analysis for Multi-Labeling with Improved ResNet Hybrid Algorithm.” <i>Electronics</i> 12, no. 6 (2023). <a href=\"https://doi.org/10.3390/electronics12061298\">https://doi.org/10.3390/electronics12061298</a>."},"author":[{"last_name":"Irfan","full_name":"Irfan, Muhammad","first_name":"Muhammad"},{"first_name":"Nasir","full_name":"Ayub, Nasir","last_name":"Ayub"},{"first_name":"Qazi Arbab","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169761496","id":"257333","last_name":"Ahmed","orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab"},{"full_name":"Rahman, Saifur","last_name":"Rahman","first_name":"Saifur"},{"last_name":"Bashir","full_name":"Bashir, Muhammad Salman","first_name":"Muhammad Salman"},{"last_name":"Nowakowski","full_name":"Nowakowski, Grzegorz","first_name":"Grzegorz"},{"last_name":"Alqhtani","full_name":"Alqhtani, Samar M.","first_name":"Samar M."},{"last_name":"Sieja","full_name":"Sieja, Marek","first_name":"Marek"}],"issue":"6","publication_status":"published","publication":"Electronics","user_id":"220548","type":"journal_article","publication_identifier":{"eissn":["2079-9292"]},"tmp":{"short":"CC BY (4.0)","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png"},"volume":12,"title":"AQSA: Aspect-Based Quality Sentiment Analysis for Multi-Labeling with Improved ResNet Hybrid Algorithm","date_created":"2024-10-17T12:46:23Z"},{"publication_identifier":{"eisbn":["978-1-6654-6605-9"]},"type":"conference","corporate_editor":["IEEE"],"user_id":"220548","publication":"2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","publication_status":"published","date_created":"2024-10-17T12:46:35Z","title":"On the Detection and Circumvention of Bitstream-level Trojans in FPGAs","_id":"5056","year":"2022","language":[{"iso":"eng"}],"citation":{"ieee":"Q. A. Ahmed and M. Platzner, “On the Detection and Circumvention of Bitstream-level Trojans in FPGAs,” in <i>2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)</i>, Nicosia, Cyprus, 2022, pp. 434–439.","alphadin":"<span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Platzner, Marco</span>: On the Detection and Circumvention of Bitstream-level Trojans in FPGAs. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)</i> : IEEE, 2022, S. 434–439","bibtex":"@inproceedings{Ahmed_Platzner_2022, title={On the Detection and Circumvention of Bitstream-level Trojans in FPGAs}, DOI={<a href=\"https://doi.org/10.1109/ISVLSI54635.2022.00097\">10.1109/ISVLSI54635.2022.00097</a>}, booktitle={2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)}, publisher={IEEE}, author={Ahmed, Qazi Arbab and Platzner, Marco}, editor={IEEEEditor}, year={2022}, pages={434–439} }","apa":"Ahmed, Q. A., &#38; Platzner, M. (2022). On the Detection and Circumvention of Bitstream-level Trojans in FPGAs. In IEEE (Ed.), <i>2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)</i> (pp. 434–439). Nicosia, Cyprus: IEEE. <a href=\"https://doi.org/10.1109/ISVLSI54635.2022.00097\">https://doi.org/10.1109/ISVLSI54635.2022.00097</a>","short":"Q.A. Ahmed, M. Platzner, in: IEEE (Ed.), 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), IEEE, 2022, pp. 434–439.","chicago":"Ahmed, Qazi Arbab, and Marco Platzner. “On the Detection and Circumvention of Bitstream-Level Trojans in FPGAs.” In <i>2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)</i>, edited by IEEE, 434–39. IEEE, 2022. <a href=\"https://doi.org/10.1109/ISVLSI54635.2022.00097\">https://doi.org/10.1109/ISVLSI54635.2022.00097</a>.","mla":"Ahmed, Qazi Arbab, and Marco Platzner. “On the Detection and Circumvention of Bitstream-Level Trojans in FPGAs.” <i>2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)</i>, edited by IEEE, IEEE, 2022, pp. 434–39, doi:<a href=\"https://doi.org/10.1109/ISVLSI54635.2022.00097\">10.1109/ISVLSI54635.2022.00097</a>.","ama":"Ahmed QA, Platzner M. On the Detection and Circumvention of Bitstream-level Trojans in FPGAs. In: IEEE, ed. <i>2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)</i>. IEEE; 2022:434-439. doi:<a href=\"https://doi.org/10.1109/ISVLSI54635.2022.00097\">10.1109/ISVLSI54635.2022.00097</a>"},"author":[{"id":"257333","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169761385","first_name":"Qazi Arbab","full_name":"Ahmed, Qazi Arbab","orcid":"0000-0002-1837-2254","last_name":"Ahmed"},{"first_name":"Marco","last_name":"Platzner","full_name":"Platzner, Marco"}],"status":"public","conference":{"location":"Nicosia, Cyprus","name":"2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","start_date":"2022-07-04","end_date":"2022-07-06"},"doi":"10.1109/ISVLSI54635.2022.00097","date_updated":"2026-03-17T15:29:13Z","page":"434-439","publisher":"IEEE"},{"type":"conference","publication_identifier":{"eisbn":["978-1-6654-2614-5"]},"user_id":"220548","publication":"2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)","publication_status":"published","title":"Hardware Trojans in Reconfigurable Computing","date_created":"2024-10-17T12:46:57Z","year":"2021","_id":"5057","language":[{"iso":"eng"}],"citation":{"apa":"Ahmed, Q. A. (2021). Hardware Trojans in Reconfigurable Computing. In <i>2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)</i> (pp. 1–2). Singapore, Singapore: IEEE. <a href=\"https://doi.org/10.1109/VLSI-SoC53125.2021.9606974\">https://doi.org/10.1109/VLSI-SoC53125.2021.9606974</a>","bibtex":"@inproceedings{Ahmed_2021, title={Hardware Trojans in Reconfigurable Computing}, DOI={<a href=\"https://doi.org/10.1109/VLSI-SoC53125.2021.9606974\">10.1109/VLSI-SoC53125.2021.9606974</a>}, booktitle={2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)}, publisher={IEEE}, author={Ahmed, Qazi Arbab}, year={2021}, pages={1–2} }","alphadin":"<span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span>: Hardware Trojans in Reconfigurable Computing. In: <i>2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)</i> : IEEE, 2021, S. 1–2","ieee":"Q. A. Ahmed, “Hardware Trojans in Reconfigurable Computing,” in <i>2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)</i>, Singapore, Singapore, 2021, pp. 1–2.","ama":"Ahmed QA. Hardware Trojans in Reconfigurable Computing. In: <i>2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)</i>. IEEE; 2021:1-2. doi:<a href=\"https://doi.org/10.1109/VLSI-SoC53125.2021.9606974\">10.1109/VLSI-SoC53125.2021.9606974</a>","mla":"Ahmed, Qazi Arbab. “Hardware Trojans in Reconfigurable Computing.” <i>2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)</i>, IEEE, 2021, pp. 1–2, doi:<a href=\"https://doi.org/10.1109/VLSI-SoC53125.2021.9606974\">10.1109/VLSI-SoC53125.2021.9606974</a>.","chicago":"Ahmed, Qazi Arbab. “Hardware Trojans in Reconfigurable Computing.” In <i>2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)</i>, 1–2. IEEE, 2021. <a href=\"https://doi.org/10.1109/VLSI-SoC53125.2021.9606974\">https://doi.org/10.1109/VLSI-SoC53125.2021.9606974</a>.","short":"Q.A. Ahmed, in: 2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), IEEE, 2021, pp. 1–2."},"author":[{"orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab","last_name":"Ahmed","first_name":"Qazi Arbab","id":"257333","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169762576"}],"conference":{"start_date":"2021-10-04","end_date":"2021-10-07","location":"Singapore, Singapore","name":"2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC)"},"status":"public","doi":"10.1109/VLSI-SoC53125.2021.9606974","page":"1-2","publisher":"IEEE","date_updated":"2026-03-17T15:29:13Z"},{"citation":{"chicago":"Ahmed, Qazi Arbab, Tobias Wiersema, and Marco Platzner. “Malicious Routing: Circumventing Bitstream-Level Verification for FPGAs.” In <i>2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE)</i>, edited by IEEE, 1490–95. IEEE, 2021. <a href=\"https://doi.org/10.23919/DATE51398.2021.9474026\">https://doi.org/10.23919/DATE51398.2021.9474026</a>.","short":"Q.A. Ahmed, T. Wiersema, M. Platzner, in: IEEE (Ed.), 2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE), IEEE, 2021, pp. 1490–1495.","ama":"Ahmed QA, Wiersema T, Platzner M. Malicious Routing: Circumventing Bitstream-level Verification for FPGAs. In: IEEE, ed. <i>2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE)</i>. IEEE; 2021:1490-1495. doi:<a href=\"https://doi.org/10.23919/DATE51398.2021.9474026\">10.23919/DATE51398.2021.9474026</a>","mla":"Ahmed, Qazi Arbab, et al. “Malicious Routing: Circumventing Bitstream-Level Verification for FPGAs.” <i>2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE)</i>, edited by IEEE, IEEE, 2021, pp. 1490–95, doi:<a href=\"https://doi.org/10.23919/DATE51398.2021.9474026\">10.23919/DATE51398.2021.9474026</a>.","ieee":"Q. A. Ahmed, T. Wiersema, and M. Platzner, “Malicious Routing: Circumventing Bitstream-level Verification for FPGAs,” in <i>2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE)</i>, Grenoble, France, 2021, pp. 1490–1495.","bibtex":"@inproceedings{Ahmed_Wiersema_Platzner_2021, title={Malicious Routing: Circumventing Bitstream-level Verification for FPGAs}, DOI={<a href=\"https://doi.org/10.23919/DATE51398.2021.9474026\">10.23919/DATE51398.2021.9474026</a>}, booktitle={2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE)}, publisher={IEEE}, author={Ahmed, Qazi Arbab and Wiersema, Tobias and Platzner, Marco}, editor={IEEEEditor}, year={2021}, pages={1490–1495} }","apa":"Ahmed, Q. A., Wiersema, T., &#38; Platzner, M. (2021). Malicious Routing: Circumventing Bitstream-level Verification for FPGAs. In IEEE (Ed.), <i>2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE)</i> (pp. 1490–1495). Grenoble, France: IEEE. <a href=\"https://doi.org/10.23919/DATE51398.2021.9474026\">https://doi.org/10.23919/DATE51398.2021.9474026</a>","alphadin":"<span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Wiersema, Tobias</span> ; <span style=\"font-variant:small-caps;\">Platzner, Marco</span>: Malicious Routing: Circumventing Bitstream-level Verification for FPGAs. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2021 Design, Automation &#38; Test in Europe Conference &#38; Exhibition (DATE)</i> : IEEE, 2021, S. 1490–1495"},"author":[{"last_name":"Ahmed","orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab","first_name":"Qazi Arbab","id":"257333","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169761414"},{"first_name":"Tobias","last_name":"Wiersema","full_name":"Wiersema, Tobias"},{"full_name":"Platzner, Marco","last_name":"Platzner","first_name":"Marco"}],"status":"public","conference":{"location":"Grenoble, France","name":"2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start_date":"2021-02-01","end_date":"2021-02-05"},"doi":"10.23919/DATE51398.2021.9474026","date_updated":"2026-03-17T15:29:13Z","page":"1490-1495","publisher":"IEEE","_id":"5058","year":"2021","language":[{"iso":"eng"}],"date_created":"2024-10-17T12:48:00Z","title":"Malicious Routing: Circumventing Bitstream-level Verification for FPGAs","publication_identifier":{"eisbn":["978-3-9819263-5-4"]},"type":"conference","corporate_editor":["IEEE"],"user_id":"220548","publication":"2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)","publication_status":"published"},{"page":"127-136","publisher":"Springer International Publishing","date_updated":"2026-03-17T15:29:13Z","doi":"10.1007/978-3-030-17227-5_10","conference":{"end_date":"2019-04-11","start_date":"2019-04-09","location":"Darmstadt, Germany","name":"Applied Reconfigurable Computing. 15th International Symposium, ARC 2019"},"status":"public","place":"Cham","author":[{"orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169760877","id":"257333","first_name":"Qazi Arbab","full_name":"Ahmed, Qazi Arbab","orcid":"0000-0002-1837-2254","last_name":"Ahmed"},{"first_name":"Tobias","full_name":"Wiersema, Tobias","last_name":"Wiersema"},{"full_name":"Platzner, Marco","last_name":"Platzner","first_name":"Marco"}],"citation":{"alphadin":"<span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Wiersema, Tobias</span> ; <span style=\"font-variant:small-caps;\">Platzner, Marco</span>: Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan. In: <span style=\"font-variant:small-caps;\">Hochberger, C.</span> ; <span style=\"font-variant:small-caps;\">Nelson, B.</span> ; <span style=\"font-variant:small-caps;\">Koch, A.</span> ; <span style=\"font-variant:small-caps;\">Woods, R.</span> ; <span style=\"font-variant:small-caps;\">Diniz, P.</span> (Hrsg.): <i>Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings</i>, <i>Lecture Notes in Computer Science</i>. Cham : Springer International Publishing, 2019, S. 127–136","apa":"Ahmed, Q. A., Wiersema, T., &#38; Platzner, M. (2019). Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan. In C. Hochberger, B. Nelson, A. Koch, R. Woods, &#38; P. Diniz (Eds.), <i>Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings</i> (pp. 127–136). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-030-17227-5_10\">https://doi.org/10.1007/978-3-030-17227-5_10</a>","bibtex":"@inproceedings{Ahmed_Wiersema_Platzner_2019, place={Cham}, series={Lecture Notes in Computer Science}, title={Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-17227-5_10\">10.1007/978-3-030-17227-5_10</a>}, booktitle={Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings}, publisher={Springer International Publishing}, author={Ahmed, Qazi Arbab and Wiersema, Tobias and Platzner, Marco}, editor={Hochberger, Christian and Nelson, Brent and Koch, Andreas and Woods, Roger and Diniz, PedroEditors}, year={2019}, pages={127–136}, collection={Lecture Notes in Computer Science} }","ieee":"Q. A. Ahmed, T. Wiersema, and M. Platzner, “Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan,” in <i>Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings</i>, Darmstadt, Germany, 2019, pp. 127–136.","mla":"Ahmed, Qazi Arbab, et al. “Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan.” <i>Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings</i>, edited by Christian Hochberger et al., Springer International Publishing, 2019, pp. 127–36, doi:<a href=\"https://doi.org/10.1007/978-3-030-17227-5_10\">10.1007/978-3-030-17227-5_10</a>.","ama":"Ahmed QA, Wiersema T, Platzner M. Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan. In: Hochberger C, Nelson B, Koch A, Woods R, Diniz P, eds. <i>Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings</i>. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2019:127-136. doi:<a href=\"https://doi.org/10.1007/978-3-030-17227-5_10\">10.1007/978-3-030-17227-5_10</a>","chicago":"Ahmed, Qazi Arbab, Tobias Wiersema, and Marco Platzner. “Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan.” In <i>Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings</i>, edited by Christian Hochberger, Brent Nelson, Andreas Koch, Roger Woods, and Pedro Diniz, 127–36. Lecture Notes in Computer Science. Cham: Springer International Publishing, 2019. <a href=\"https://doi.org/10.1007/978-3-030-17227-5_10\">https://doi.org/10.1007/978-3-030-17227-5_10</a>.","short":"Q.A. Ahmed, T. Wiersema, M. Platzner, in: C. Hochberger, B. Nelson, A. Koch, R. Woods, P. Diniz (Eds.), Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings, Springer International Publishing, Cham, 2019, pp. 127–136."},"language":[{"iso":"eng"}],"year":"2019","editor":[{"first_name":"Christian","last_name":"Hochberger","full_name":"Hochberger, Christian"},{"first_name":"Brent","last_name":"Nelson","full_name":"Nelson, Brent"},{"last_name":"Koch","full_name":"Koch, Andreas","first_name":"Andreas"},{"last_name":"Woods","full_name":"Woods, Roger","first_name":"Roger"},{"full_name":"Diniz, Pedro","last_name":"Diniz","first_name":"Pedro"}],"_id":"5059","title":"Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan","date_created":"2024-10-17T12:48:24Z","publication":"Applied Reconfigurable Computing. 15th International Symposium, ARC 2019, Darmstadt, Germany, April 9–11, 2019, Proceedings","series_title":"Lecture Notes in Computer Science","publication_status":"published","user_id":"220548","publication_identifier":{"eisbn":["978-3-030-17227-5"],"eissn":["1611-3349"],"isbn":["978-3-030-17226-8"],"issn":["0302-9743"]},"type":"conference"},{"title":"Process to enhance the quality of software requirement specification document","date_created":"2024-10-17T12:48:49Z","publication":"2018 International Conference on Engineering and Emerging Technologies (ICEET)","publication_status":"published","user_id":"220548","corporate_editor":["IEEE"],"type":"conference","publication_identifier":{"eisbn":["978-1-5386-3205-5"]},"page":"1-7","publisher":"IEEE","date_updated":"2026-03-17T15:29:13Z","doi":"10.1109/ICEET1.2018.8338619","conference":{"end_date":"2018-02-23","start_date":"2018-02-22","name":"2018 International Conference on Engineering and Emerging Technologies (ICEET)","location":"Lahore, Pakistan "},"status":"public","author":[{"last_name":"Ali","full_name":"Ali, Syed Waqas","first_name":"Syed Waqas"},{"orcid":"0000-0002-1837-2254","full_name":"Ahmed, Qazi Arbab","last_name":"Ahmed","first_name":"Qazi Arbab","id":"257333","orcid_put_code_url":"https://api.orcid.org/v2.0/0000-0002-1837-2254/work/169761331"},{"first_name":"Imran","full_name":"Shafi, Imran","last_name":"Shafi"}],"citation":{"mla":"Ali, Syed Waqas, et al. “Process to Enhance the Quality of Software Requirement Specification Document.” <i>2018 International Conference on Engineering and Emerging Technologies (ICEET)</i>, edited by IEEE, IEEE, 2018, pp. 1–7, doi:<a href=\"https://doi.org/10.1109/ICEET1.2018.8338619\">10.1109/ICEET1.2018.8338619</a>.","ama":"Ali SW, Ahmed QA, Shafi I. Process to enhance the quality of software requirement specification document. In: IEEE, ed. <i>2018 International Conference on Engineering and Emerging Technologies (ICEET)</i>. IEEE; 2018:1-7. doi:<a href=\"https://doi.org/10.1109/ICEET1.2018.8338619\">10.1109/ICEET1.2018.8338619</a>","chicago":"Ali, Syed Waqas, Qazi Arbab Ahmed, and Imran Shafi. “Process to Enhance the Quality of Software Requirement Specification Document.” In <i>2018 International Conference on Engineering and Emerging Technologies (ICEET)</i>, edited by IEEE, 1–7. IEEE, 2018. <a href=\"https://doi.org/10.1109/ICEET1.2018.8338619\">https://doi.org/10.1109/ICEET1.2018.8338619</a>.","short":"S.W. Ali, Q.A. Ahmed, I. Shafi, in: IEEE (Ed.), 2018 International Conference on Engineering and Emerging Technologies (ICEET), IEEE, 2018, pp. 1–7.","alphadin":"<span style=\"font-variant:small-caps;\">Ali, Syed Waqas</span> ; <span style=\"font-variant:small-caps;\">Ahmed, Qazi Arbab</span> ; <span style=\"font-variant:small-caps;\">Shafi, Imran</span>: Process to enhance the quality of software requirement specification document. In: <span style=\"font-variant:small-caps;\">IEEE</span> (Hrsg.): <i>2018 International Conference on Engineering and Emerging Technologies (ICEET)</i> : IEEE, 2018, S. 1–7","apa":"Ali, S. W., Ahmed, Q. A., &#38; Shafi, I. (2018). Process to enhance the quality of software requirement specification document. In IEEE (Ed.), <i>2018 International Conference on Engineering and Emerging Technologies (ICEET)</i> (pp. 1–7). Lahore, Pakistan : IEEE. <a href=\"https://doi.org/10.1109/ICEET1.2018.8338619\">https://doi.org/10.1109/ICEET1.2018.8338619</a>","bibtex":"@inproceedings{Ali_Ahmed_Shafi_2018, title={Process to enhance the quality of software requirement specification document}, DOI={<a href=\"https://doi.org/10.1109/ICEET1.2018.8338619\">10.1109/ICEET1.2018.8338619</a>}, booktitle={2018 International Conference on Engineering and Emerging Technologies (ICEET)}, publisher={IEEE}, author={Ali, Syed Waqas and Ahmed, Qazi Arbab and Shafi, Imran}, editor={IEEEEditor}, year={2018}, pages={1–7} }","ieee":"S. W. Ali, Q. A. Ahmed, and I. Shafi, “Process to enhance the quality of software requirement specification document,” in <i>2018 International Conference on Engineering and Emerging Technologies (ICEET)</i>, Lahore, Pakistan , 2018, pp. 1–7."},"language":[{"iso":"eng"}],"year":"2018","_id":"5060"}]
