Dynamic partial reconfiguration enables multi-tenancy in cloud-based FPG...
The traditional convolution neural networks (CNN) have several drawbacks...
Side-channel attacks on microprocessors, like the RISC-V, exhibit securi...
Convolutional Neural Networks (CNN) have shown impressive performance in...
From tiny pacemaker chips to aircraft collision avoidance systems, the
s...
In this paper, we propose GNNUnlock, the first-of-its-kind oracle-less
m...
Traditional learning-based approaches for run-time Hardware Trojan detec...
With a constant improvement in the network architectures and training
me...
Recently, many adversarial examples have emerged for Deep Neural Network...
Due to data dependency and model leakage properties, Deep Neural Network...
Capsule Networks envision an innovative point of view about the
represen...
Conventional Hardware Trojan (HT) detection techniques are based on the
...
The exponential increase in dependencies between the cyber and physical ...
Security vulnerability analysis of Integrated Circuits using conventiona...
Deep neural networks (DNN)-based machine learning (ML) algorithms have
r...
Recent studies have shown that slight perturbations in the input data ca...
Deep Neural Networks (DNNs) have recently been shown vulnerable to
adver...
Due to big data analysis ability, machine learning (ML) algorithms are
b...
The Internet of Things (IoT) is an ubiquitous system connecting many
dif...