Stealing neural network structure through remote FPGA side-channel analysis

Y Zhang, R Yasaei, H Chen, Z Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Deep Neural Network (DNN) models have been extensively developed by companies for a
wide range of applications. The development of a customized DNN model with great …

Hardware trojan detection using graph neural networks

R Yasaei, L Chen, SY Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third party …

HW2VEC: A graph learning tool for automating hardware security

SY Yu, R Yasaei, Q Zhou, T Nguyen… - … Oriented Security and …, 2021 - ieeexplore.ieee.org
The time-to-market pressure and continuous growing complexity of hardware designs have
promoted the globalization of the Integrated Circuit (IC) supply chain. However, such …

Graph neural networks: A powerful and versatile tool for advancing design, reliability, and security of ICs

L Alrahis, J Knechtel, O Sinanoglu - Proceedings of the 28th Asia and …, 2023 - dl.acm.org
Graph neural networks (GNNs) have pushed the state-of-the-art (SOTA) for performance in
learning and predicting on large-scale data present in social networks, biology, etc. Since …

Embracing graph neural networks for hardware security

L Alrahis, S Patnaik, M Shafique… - Proceedings of the 41st …, 2022 - dl.acm.org
Graph neural networks (GNNs) have attracted increasing attention due to their superior
performance in deep learning on graph-structured data. GNNs have succeeded across …

Golden reference-free hardware trojan localization using graph convolutional network

R Yasaei, S Faezi… - IEEE Transactions on Very …, 2022 - ieeexplore.ieee.org
The globalization of the integrated circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third-party …

: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems

L Alrahis, S Patnaik, MA Hanif… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Graph neural networks (GNNs) have shown great success in detecting intellectual property
(IP) piracy and hardware Trojans (HTs). However, the machine learning community has …

Analysis of third-party request structures to detect fraudulent websites

RD Gopal, A Hojati, RA Patterson - Decision Support Systems, 2022 - Elsevier
Third-party websites or applications are the key entities in the web eco-system that enable
websites to function and offer services. Almost every organization today uses dozens of …

A survey and perspective on artificial intelligence for security-aware electronic design automation

D Koblah, R Acharya, D Capecci… - ACM Transactions on …, 2023 - dl.acm.org
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly
used in several fields to improve performance and the level of automation. In recent years …

Device-Bind Key-Storageless Hardware AI Model IP Protection: A PUF and Permute-Diffusion Encryption-Enabled Approach

Q Pan, M Dong, K Ota, J Wu - arXiv preprint arXiv:2212.11133, 2022 - arxiv.org
Machine learning as a service (MLaaS) framework provides intelligent services or well-
trained artificial intelligence (AI) models for local devices. However, in the process of model …