LLM for SoC Security: A Paradigm Shift
Saha, Dipayan, Tarek, Shams, Yahyaei, Katayoon, Saha, Sujan Kumar, Zhou, Jingbo, Tehranipoor, Mark, Farahmandi, Farimah
Published in IEEE access (2024)
Published in IEEE access (2024)
Get full text
Journal Article
A composite kernel for named entity recognition
Saha, Sujan Kumar, Narayan, Shashi, Sarkar, Sudeshna, Mitra, Pabitra
Published in Pattern recognition letters (01.09.2010)
Published in Pattern recognition letters (01.09.2010)
Get full text
Journal Article
Empowering Hardware Security with LLM: The Development of a Vulnerable Hardware Database
Saha, Dipayan, Yahyaei, Katayoon, Kumar Saha, Sujan, Tehranipoor, Mark, Farahmandi, Farimah
Published in 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (06.05.2024)
Published in 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (06.05.2024)
Get full text
Conference Proceeding
FPGA Accelerated Embedded System Security Through Hardware Isolation
Kumar Saha, Sujan, Bobda, Christophe
Published in 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (15.12.2020)
Published in 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (15.12.2020)
Get full text
Conference Proceeding
The first named entity recognizer in Maithili: Resource creation and system development
Priyadarshi, Ankur, Saha, Sujan Kumar
Published in Journal of intelligent & fuzzy systems (01.01.2021)
Published in Journal of intelligent & fuzzy systems (01.01.2021)
Get full text
Journal Article
Automatic Multiple Choice Question Generation From Text: A Survey
CH, Dhawaleswar Rao, Saha, Sujan Kumar
Published in IEEE transactions on learning technologies (01.01.2020)
Published in IEEE transactions on learning technologies (01.01.2020)
Get full text
Journal Article