In recent decades, due to the emerging requirements of computation
accel...
The Electrocardiogram (ECG) measures the electrical cardiac activity
gen...
Logic obfuscation is introduced as a pivotal defense against multiple
ha...
This paper presents a novel model training solution, denoted as
Adaptive...
Cloud computing paradigms have emerged as a major facility to store and
...
The globalization of the IC supply chain has raised many security threat...
In this paper, we propose a canonical prune-and-SAT (CP SAT) attack fo...
In this paper, we propose a novel solution to reduce the computational
c...
This paper proposes an ensemble learning model that is resistant to
adve...
In this paper, we introduce SCRAMBLE, as a novel logic locking solution ...
In this paper, we assess the security and testability of the state-of-th...
Generalized from image and language translation, graph translation aims ...
In this paper, we introduce DFSSD, a novel logic locking solution for
se...
State-of-the-art attacks against cyclic logic obfuscation use satisfiabi...
In this paper, we introduce a Learning Assisted Side Channel delay Analy...
In this paper, we propose Code-Bridged Classifier (CBC), a framework for...
In this paper, we first propose the design of Temporal-Carry-deferring M...
In this paper, we present NESTA, a specialized Neural engine that
signif...
In this paper, we introduce a novel Communication and Obfuscation Manage...
Online health communities such as the online breast cancer forum enable
...
The emergence of High-Level Synthesis (HLS) tools shifted the paradigm o...
Advances in embedded systems have enabled integration of many lightweigh...
To reduce the cost of ICs and to meet the market's demand, a considerabl...
Circuit obfuscation is a recently proposed defense mechanism to protect
...
In this paper, we investigate the strength of six different SAT solvers ...
In this work, we propose LUT-Lock, a novel Look-Up-Table-based netlist
o...