Author of the publication

Adversarial Perturbation Attacks on ML-based CAD: A Case Study on CNN-based Lithographic Hotspot Detection.

, , , , , , , and . ACM Trans. Design Autom. Electr. Syst., 25 (5): 48:1-48:31 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Feature-Based On-Line Detector to Remove Adversarial-Backdoors by Iterative Demarcation., , , , and . IEEE Access, (2022)Bulls-Eye: Active Few-Shot Learning Guided Logic Synthesis., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (8): 2580-2590 (2023)Training Data Poisoning in ML-CAD: Backdooring DL-Based Lithographic Hotspot Detectors., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (6): 1244-1257 (2021)On Evaluating Neural Network Backdoor Defenses., and . CoRR, (2020)Adversarially Robust Learning via Entropic Regularization., , , and . CoRR, (2020)Thundervolt: enabling aggressive voltage underscaling and timing error resilience for energy efficient deep learning accelerators., , , and . DAC, page 19:1-19:6. ACM, (2018)BandiTS: Dynamic timing speculation using multi-armed bandit based optimization., and . DATE, page 922-925. IEEE, (2017)Low cost permanent fault detection using ultra-reduced instruction set co-processors., , and . DATE, page 933-938. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Exploiting Process Variability in Voltage/Frequency Control., , and . IEEE Trans. Very Large Scale Integr. Syst., 20 (8): 1392-1404 (2012)Outsourcing Private Machine Learning via Lightweight Secure Arithmetic Computation., , , , , and . CoRR, (2018)