Author:
Rostami M.,Koushanfar F.,Rajendran J.,Karri R.
Cited by
88 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips;IEEE Transactions on Information Forensics and Security;2024
2. Bypass Leakage Risk Assessment Based on Mutual Information Game;2023 International Conference on Computer Science and Automation Technology (CSAT);2023-10-06
3. Built-in Software Obfuscation for Protecting Microprocessors against Hardware Trojan Horses;2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT);2023-10-03
4. Improving the Detection of Hardware Trojan Horses in Microprocessors via Hamming Codes;2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT);2023-10-03
5. $\tt{PoisonedGNN}$: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems;IEEE Transactions on Computers;2023-10