Two sides of the same coin : boons and banes of machine learning in hardware security
The last decade has witnessed remarkable research advances at the intersection of machine learning (ML) and hardware security. The confluence of the two technologies has created many interesting and unique opportunities, but also left some issues in their wake. ML schemes have been extensively used...
Saved in:
Main Authors: | Liu, Wenye, Chang, Chip Hong, Wang, Xueyang, Liu, Chen, Fung, Jason M., Mohammad Ebrahimabadi, Karimi, Naghmeh, Meng, Xingyu, Basu, Kanad |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Article |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/155876 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
by: He, Wei, et al.
Published: (2017) -
Vulnerability analysis on noise-injection based hardware attack on deep neural networks
by: Liu, Wenye, et al.
Published: (2020) -
A low-power reliability enhanced arbiter physical unclonable function based on current starved multiplexers
by: Wang, Si, et al.
Published: (2020) -
Application of Two-Dimensional Materials in Hardware Security for IoT: Progress and Perspective
by: Heng Xiang, et al.
Published: (2023) -
A forward error compensation approach for fault resilient deep neural network accelerator design
by: Liu, Wenye, et al.
Published: (2022)