M.T. Manzuri
M.T. Manzuri
Dept. of Computer Science and Engineering, Sharif University of Technology
Verified email at - Homepage
Cited by
Cited by
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
T Eisenbarth, T Kasper, A Moradi, C Paar, M Salmasizadeh, ...
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
Information hiding using audio steganography–a survey
P Jayaram, HR Ranganatha, HS Anupama
The International Journal of Multimedia & Its Applications (IJMA) Vol 3, 86-96, 2011
A generalized method of differential fault attack against AES cryptosystem
A Moradi, MTM Shalmani, M Salmasizadeh
Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006
Genetic algorithm‐optimised structure of convolutional neural network for face recognition applications
A Rikhtegar, M Pooyan, MT Manzuri‐Shalmani
IET Computer Vision 10 (6), 559-566, 2016
High capacity error free wavelet domain speech steganography
S Shirali-Shahreza, MT Manzuri-Shalmani
2008 IEEE international conference on acoustics, speech and signal …, 2008
A study of CAPTCHAs for securing web services
MT Banday, NA Shah
arXiv preprint arXiv:1112.5605, 2011
Forecasting stock market for an efficient portfolio by combining XGBoost and Hilbert–Huang transform
A Dezhkam, MT Manzuri
Engineering Applications of Artificial Intelligence 118, 105626, 2023
Distance-based segmentation: An energy-efficient clustering hierarchy for wireless microsensor networks
N Amini, M Fazeli, SG Miremadi, MT Manzuri
Fifth Annual Conference on Communication Networks and Services Research …, 2007
Roboshark: A gantry pool player robot
ME Alian, SB Shouraki, M Shalmani, P Karimian, P Sabzmeydani
Thirty-Fifth International Symposium on Robotics (ISR 2004), Paris, 2004
Active learning from positive and unlabeled data
A Ghasemi, HR Rabiee, M Fadaee, MT Manzuri, MH Rohban
2011 IEEE 11th International Conference on Data Mining Workshops, 244-250, 2011
Hardware Trojan detection based on logical testing
A Bazzazi, MT Manzuri Shalmani, AMA Hemmatyar
Journal of Electronic Testing 33, 381-395, 2017
Wavelet based speech enhancement using a new thresholding algorithm
S Ayat, MT Manzuri, R Dianat
Proceedings of 2004 International Symposium on Intelligent Multimedia, Video …, 2004
Dual-rail transition logic: A logic style for counteracting power analysis attacks
A Moradi, MTM Shalmani, M Salmasizadeh
Computers & Electrical Engineering 35 (2), 359-369, 2009
An improved wavelet-based speech enhancement by using speech signal features
S Ayat, MT Manzuri-Shalmani, R Dianat
Computers & Electrical Engineering 32 (6), 411-425, 2006
Delay and energy consumption analysis of conventional SRAM
A Azizi-Mazreah, MTM Shalmani, H Barati, A Barati
Proc. Of World Academy of Science, Engineering and Technology 27, 2008
Efficient and safe path planning for a mobile robot using genetic algorithm
M Naderan-Tahan, MT Manzuri-Shalmani
2009 IEEE Congress on Evolutionary Computation, 2091-2097, 2009
Physical cryptanalysis of keeloq code hopping applications
T Eisenbarth, T Kasper, A Moradi, C Paar, M Salmasizadeh, ...
Cryptology ePrint Archive, 2008
A secure and low-energy logic style using charge recovery approach
M Khatir, A Moradi, A Ejlali, MT Manzuri Shalmani, M Salmasizadeh
Proceedings of the 2008 international symposium on Low Power Electronics …, 2008
Esophageal tumor segmentation in CT images using a dilated dense attention Unet (DDAUnet)
S Yousefi, H Sokooti, MS Elmahdy, IM Lips, MTM Shalmani, RT Zinkstok, ...
IEEE Access 9, 99235-99248, 2021
Learning of Gaussian processes in distributed and communication limited systems
M Tavassolipour, SA Motahari, MTM Shalmani
IEEE transactions on pattern analysis and machine intelligence 42 (8), 1928-1941, 2019
The system can't perform the operation now. Try again later.
Articles 1–20