Search

Your search keyword '"Homayoun, Houman"' showing total 641 results

Search Constraints

Start Over You searched for: Author "Homayoun, Houman" Remove constraint Author: "Homayoun, Houman"
641 results on '"Homayoun, Houman"'

Search Results

1. APEX: Attention on Personality based Emotion ReXgnition Framework

2. Advanced Energy-Efficient System for Precision Electrodermal Activity Monitoring in Stress Detection

3. Automated Hardware Logic Obfuscation Framework Using GPT

4. FFCL: Forward-Forward Net with Cortical Loops, Training and Inference on Edge Without Backpropagation

5. Generative AI-Based Effective Malware Detection for Embedded Computing Systems

6. Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing

7. HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion

8. Large Language Models for Code Analysis: Do LLMs Really Do Their Job?

9. SMOOT: Saliency Guided Mask Optimized Online Training

11. Gotcha! I Know What You are Doing on the FPGA Cloud: Fingerprinting Co-Located Cloud FPGA Accelerators via Measuring Communication Links

12. Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification

13. A Neural Network-based SAT-Resilient Obfuscation Towards Enhanced Logic Locking

14. Adaptive-Gravity: A Defense Against Adversarial Samples

15. Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks

16. NNgSAT: Neural Network guided SAT Attack on Logic Locked Complex Structures

17. InterLock: An Intercorrelated Logic and Routing Locking

18. Conditional Classification: A Solution for Computational Energy Reduction

19. Diverse Knowledge Distillation (DKD): A Solution for Improving The Robustness of Ensemble Models Against Adversarial Attacks

20. SCRAMBLE: The State, Connectivity and Routing Augmentation Model for Building Logic Encryption

21. On Designing Secure and Robust Scan Chain for Protecting Obfuscated Logic

22. Deep Multi-attributed Graph Translation with Node-Edge Co-evolution

23. DFSSD: Deep Faults and Shallow State Duality, A Provably Strong Obfuscation Solution for Circuits with Restricted Access to Scan Chain

24. SAT-hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain

25. LASCA: Learning Assisted Side Channel Delay Analysis for Hardware Trojan Detection

26. Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

27. Adversarial Machine Learning

29. Transfer Learning in Mobile Health

32. Graph Learning

33. Online Learning

34. Reinforcement Learning

35. Supervised Learning

37. Unsupervised Learning

38. What Is Applied Machine Learning?

39. TCD-NPE: A Re-configurable and Efficient Neural Processing Engine, Powered by Novel Temporal-Carry-deferring MACs

40. NESTA: Hamming Weight Compression-Based Neural Proc. Engine

41. Deep Graph Learning for Circuit Deobfuscation

42. COMA: Communication and Obfuscation Management Architecture

43. DynGraph2Seq: Dynamic-Graph-to-Sequence Interpretable Learning for Health Stage Prediction in Online Health Forums

44. Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design

45. Resource-Efficient Wearable Computing for Real-Time Reconfigurable Machine Learning: A Cascading Binary Classification

46. Threats on Logic Locking: A Decade Later

47. Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning

49. Security Threats in Cloud Rooted from Machine Learning-Based Resource Provisioning Systems

Catalog

Books, media, physical & digital resources