569 results on '"Sinanoglu, Ozgur"'
Search Results
102. Benchmarking Advanced Security Closure of Physical Layouts
103. Security Closure of IC Layouts Against Hardware Trojans
104. X-Volt
105. Progressive Learning With Recurrent Neural Network for Sequence Classification
106. Hardware Security and Trust: Logic Locking as a Design-for-Trust Solution
107. Graph Neural Networks
108. Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks
109. Progressive Learning With Recurrent Neural Network for Sequence Classification
110. Leveraging Ferroelectric Stochasticity and In-Memory Computing for DNN IP Obfuscation
111. GNN4REL: Graph Neural Networks for Predicting Circuit Reliability Degradation
112. A Novel Attack Mode on Advanced Technology Nodes Exploiting Transistor Self-Heating
113. AppGNN
114. Embracing Graph Neural Networks for Hardware Security
115. GNN-RE: Graph Neural Networks for Reverse Engineering of Gate-Level Netlists
116. Digitally Assisted Mixed-Signal Circuit Security
117. <inline-formula><tex-math notation="LaTeX">$\tt{PoisonedGNN}$</tex-math></inline-formula>: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems
118. RESCUE: Resilient, Scalable, High-Corruption, Compact-Key-Set Locking Framework
119. NeuroUnlock: Unlocking the Architecture of Obfuscated Deep Neural Networks
120. AntiDOTE: Protecting Debug Against Outsourced Test Entities
121. SCRAMBLE: A Secure and Configurable, Memristor-Based Neuromorphic Hardware Leveraging 3D Architecture
122. PolyWorm: Leveraging Polymorphic Behavior to Implant Hardware Trojans
123. GNNUnlock+: A Systematic Methodology for Designing Graph Neural Networks-Based Oracle-Less Unlocking Schemes for Provably Secure Logic Locking
124. Hardware Trojan Threats to Cache Coherence in Modern 2.5D Chiplet Systems
125. A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
126. Benchmarking Security Closure of Physical Layouts
127. MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction
128. OMLA: An Oracle-Less Machine Learning-Based Attack on Logic Locking
129. Concerted Wire Lifting: Enabling Secure and Cost-Effective Split Manufacturing
130. FerroCoin: Ferroelectric Tunnel Junction-Based True Random Number Generator
131. Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques
132. RESCUE: Resilient, Scalable, High-corruption, Compact-Key-Set Locking Framework
133. Opening the Doors to Dynamic Camouflaging: Harnessing the Power of Polymorphic Devices
134. Hide and Seek: Seeking the (Un)-Hidden Key in Provably-Secure Logic Locking Techniques
135. Fortifying RTL Locking Against Oracle-Less (Untrusted Foundry) and Oracle-Guided Attacks
136. Toward Security Closure in the Face of Reliability Effects ICCAD Special Session Paper
137. UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction
138. Security Closure of Physical Layouts ICCAD Special Session Paper
139. Deep Learning Analysis for Split-Manufactured Layouts With Routing Perturbation
140. ScanSAT: Unlocking Static and Dynamic Scan Obfuscation
141. A Modern Approach to IP Protection and Trojan Prevention: Split Manufacturing for 3D ICs and Obfuscation of Vertical Interconnects
142. Thwarting All Logic Locking Attacks: Dishonest Oracle With Truly Random Logic Locking
143. Reconfigurable Concurrent Error Detection Adaptive to Dynamicity of Power Constraints
144. Eliminating the Timing Penalty of Scan
145. Breaking CAS-Lock and Its Variants by Exploiting Structural Traces
146. Enhancing encoding capacity of combinational test stimulus decompressors
147. On the Application of Dynamic Scan Chain Partitioning for Reducing Peak Shift Power
148. Scan Cell Positioning for Boosting the Compression of Fan-Out Networks
149. Dynamic scan chain partitioning for reducing peak shift power during test
150. Improving the Effectiveness of Combinational Decompressors Through Judicious Partitioning of Scan Cells
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.