Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2402.17918
Cited By
The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection
27 February 2024
Amin Sarihi
Ahmad Patooghy
Abdel-Hameed A. Badawy
Peter Jamieson
Re-assign community
ArXiv
PDF
HTML
Papers citing
"The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection"
9 / 9 papers shown
Title
TrojanForge: Adversarial Hardware Trojan Examples with Reinforcement Learning
Amin Sarihi
Peter Jamieson
Ahmad Patooghy
Abdel-Hameed A. Badawy
47
0
0
24 May 2024
Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection
Amin Sarihi
Ahmad Patooghy
Peter Jamieson
Abdel-Hameed A. Badawy
45
9
0
16 May 2023
Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach
Amin Sarihi
Peter Jamieson
Ahmad Patooghy
Abdel-Hameed A. Badawy
21
5
0
26 Apr 2023
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning
Vasudev Gohil
Hao Guo
Satwik Patnaik
Jeyavijayan
Jeyavijayan Rajendran
43
26
0
26 Aug 2022
DETERRENT: Detecting Trojans using Reinforcement Learning
Vasudev Gohil
Satwik Patnaik
Hao Guo
D. Kalathil
Jeyavijayan
Jeyavijayan Rajendran
48
19
0
26 Aug 2022
Hardware Trojan Insertion Using Reinforcement Learning
Amin Sarihi
Ahmad Patooghy
Peter Jamieson
Abdel-Hameed A. Badawy
35
14
0
09 Apr 2022
OpenABC-D: A Large-Scale Dataset For Machine Learning Guided Integrated Circuit Synthesis
A. B. Chowdhury
Benjamin Tan
Ramesh Karri
S. Garg
67
38
0
21 Oct 2021
HW2VEC: A Graph Learning Tool for Automating Hardware Security
S. Yu
Rozhin Yasaei
Qingrong Zhou
Tommy Nguyen
Mohammad Abdullah Al Faruque
31
38
0
26 Jul 2021
Hardware Trojan Detection Game: A Prospect-Theoretic Approach
Walid Saad
Anibal Sanjab
Yunpeng Wang
Charles A. Kamhoua
K. Kwiat
28
34
0
22 Mar 2017
1