Search

Your search keyword '"Sasan, Avesta"' showing total 189 results

Search Constraints

Start Over You searched for: Author "Sasan, Avesta" Remove constraint Author: "Sasan, Avesta"
189 results on '"Sasan, Avesta"'

Search Results

1. Automated Hardware Logic Obfuscation Framework Using GPT

2. FFCL: Forward-Forward Net with Cortical Loops, Training and Inference on Edge Without Backpropagation

3. Generative AI-Based Effective Malware Detection for Embedded Computing Systems

4. HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion

5. SMOOT: Saliency Guided Mask Optimized Online Training

6. Gotcha! I Know What You are Doing on the FPGA Cloud: Fingerprinting Co-Located Cloud FPGA Accelerators via Measuring Communication Links

7. Adaptive-Gravity: A Defense Against Adversarial Samples

8. Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks

9. Learning Assisted Side Channel Delay Test for Detection of Recycled ICs

10. NNgSAT: Neural Network guided SAT Attack on Logic Locked Complex Structures

11. InterLock: An Intercorrelated Logic and Routing Locking

12. Conditional Classification: A Solution for Computational Energy Reduction

13. Diverse Knowledge Distillation (DKD): A Solution for Improving The Robustness of Ensemble Models Against Adversarial Attacks

14. SCRAMBLE: The State, Connectivity and Routing Augmentation Model for Building Logic Encryption

15. On Designing Secure and Robust Scan Chain for Protecting Obfuscated Logic

16. ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things

17. DFSSD: Deep Faults and Shallow State Duality, A Provably Strong Obfuscation Solution for Circuits with Restricted Access to Scan Chain

18. SAT-hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain

19. LASCA: Learning Assisted Side Channel Delay Analysis for Hardware Trojan Detection

20. Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

21. TCD-NPE: A Re-configurable and Efficient Neural Processing Engine, Powered by Novel Temporal-Carry-deferring MACs

22. NESTA: Hamming Weight Compression-Based Neural Proc. Engine

23. COMA: Communication and Obfuscation Management Architecture

24. Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design

25. Threats on Logic Locking: A Decade Later

27. Benchmarking the Capabilities and Limitations of SAT Solvers in Defeating Obfuscation Schemes

28. LUT-Lock: A Novel LUT-based Logic Obfuscation for FPGA-Bitstream and ASIC-Hardware Protection

29. SRCLock: SAT-Resistant Cyclic Logic Locking for Protecting the Hardware

33. Hardware Trojan Detection Using Machine Learning: A Tutorial

36. Optimized and Automated Secure IC Design Flow: A Defense-in-Depth Approach

38. Silicon validation of LUT-based logic-locked IP cores

39. LOCK&ROLL

41. Neuromorphic-Enabled Security for IoT

42. RAPTA: A Hierarchical Representation Learning Solution For Real-Time Prediction of Path-Based Static Timing Analysis

Catalog

Books, media, physical & digital resources