Author of the publication

Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing.

, , , , and . CoRR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Automated Framework for Board-Level Trojan Benchmarking., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (2): 397-410 (February 2023)LeGO: A Learning-Guided Obfuscation Framework for Hardware IP Protection., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (4): 854-867 (2022)Neural Storage: A New Paradigm of Elastic Memory., and . CoRR, (2021)Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing., , , , and . ACM J. Emerg. Technol. Comput. Syst., 19 (3): 25:1-25:23 (July 2023)HASTE: Software Security Analysis for Timing Attacks on Clear Hardware Assumption., , , , and . IEEE Embed. Syst. Lett., 14 (2): 71-74 (2022)P2C2: Peer-to-Peer Car Charging., , , , and . VTC Spring, page 1-5. IEEE, (2020)A Machine Learning Based Automatic Hardware Trojan Attack Space Exploration and Benchmarking Framework., , , , and . AsianHOST, page 1-6. IEEE, (2022)SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation., , and . AsianHOST, page 56-61. IEEE, (2018)Leveraging Domain Knowledge using Machine Learning for Image Compression in Internet-of-Things., , and . CoRR, (2020)BINGO: brain-inspired learning memory., and . Neural Comput. Appl., 34 (4): 3223-3247 (2022)