Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2107.12328
Cited By
HW2VEC: A Graph Learning Tool for Automating Hardware Security
26 July 2021
S. Yu
Rozhin Yasaei
Qingrong Zhou
Tommy Nguyen
Mohammad Abdullah Al Faruque
Re-assign community
ArXiv
PDF
HTML
Papers citing
"HW2VEC: A Graph Learning Tool for Automating Hardware Security"
18 / 18 papers shown
Title
Accelerating Hardware Verification with Graph Models
Raghul Saravanan
Sreenitha Kasarapu
Sai Manoj P D
GNN
80
0
0
03 Jan 2025
LLMPirate: LLMs for Black-box Hardware IP Piracy
Vasudev Gohil
Matthew DeLorenzo
Veera Vishwa Achuta Sai Venkat Nallam
Joey See
Jeyavijayan Rajendran
69
3
0
25 Nov 2024
A Benchmark on Directed Graph Representation Learning in Hardware Designs
Haoyu Wang
Yinan Huang
Nan Wu
Pan Li
OOD
48
1
0
09 Oct 2024
MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAs
Lilas Alrahis
Hassan Nassar
Jonas Krautter
Dennis R. E. Gnad
Lars Bauer
Jörg Henkel
M. Tahoori
29
2
0
04 Mar 2024
The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection
Amin Sarihi
Ahmad Patooghy
Abdel-Hameed A. Badawy
Peter Jamieson
19
1
0
27 Feb 2024
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning
Vasudev Gohil
Satwik Patnaik
D. Kalathil
Jeyavijayan Rajendran
AAML
40
3
0
21 Feb 2024
BoolGebra: Attributed Graph-learning for Boolean Algebraic Manipulation
Yingjie Li
Anthony Agnesina
Yanqing Zhang
Haoxing Ren
Cunxi Yu
29
1
0
19 Jan 2024
Uncertainty-Aware Hardware Trojan Detection Using Multimodal Deep Learning
Rahul Vishwakarma
Amin Rezaei
45
2
0
15 Jan 2024
Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection
Amin Sarihi
Ahmad Patooghy
Peter Jamieson
Abdel-Hameed A. Badawy
30
7
0
16 May 2023
Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach
Amin Sarihi
Peter Jamieson
Ahmad Patooghy
Abdel-Hameed A. Badawy
14
5
0
26 Apr 2023
Information Flow Coverage Metrics for Hardware Security Verification
Andres Meza
Ryan Kastner
14
3
0
12 Apr 2023
PoisonedGNN: Backdoor Attack on Graph Neural Networks-based Hardware Security Systems
Lilas Alrahis
Satwik Patnaik
Muhammad Abdullah Hanif
Muhammad Shafique
Ozgur Sinanoglu
20
14
0
24 Mar 2023
TrojanSAINT: Gate-Level Netlist Sampling-Based Inductive Learning for Hardware Trojan Detection
Hazem Lashen
Lilas Alrahis
J. Knechtel
Ozgur Sinanoglu
25
11
0
27 Jan 2023
Graph Neural Networks: A Powerful and Versatile Tool for Advancing Design, Reliability, and Security of ICs
Lilas Alrahis
J. Knechtel
Ozgur Sinanoglu
GNN
AI4CE
49
22
0
29 Nov 2022
Embracing Graph Neural Networks for Hardware Security (Invited Paper)
Lilas Alrahis
Satwik Patnaik
Muhammad Shafique
Ozgur Sinanoglu
28
16
0
17 Aug 2022
Golden Reference-Free Hardware Trojan Localization using Graph Convolutional Network
Rozhin Yasaei
Sina Faezi
M. A. Al Faruque
13
18
0
14 Jul 2022
Hardware Trojan Detection using Graph Neural Networks
Rozhin Yasaei
Luke Chen
Shi Yu
Mohammad Abdullah Al Faruque
20
28
0
25 Apr 2022
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
D. Koblah
R. Acharya
Daniel Capecci
Olivia P. Dizon-Paradis
Shahin Tajik
F. Ganji
D. Woodard
Domenic Forte
25
12
0
19 Apr 2022
1