Author of the publication

$PoisonedGNN$: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems.

, , , , and . IEEE Trans. Computers, 72 (10): 2822-2834 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FT-ClipAct: Resilience Analysis of Deep Neural Networks and Improving their Fault Tolerance using Clipped Activation., , and . CoRR, (2019)Detecting riots using action localization., , and . ICIP, page 3031-3035. IEEE, (2016)APNAS: Accuracy-and-Performance-Aware Neural Architecture Search for Neural Hardware Accelerators., , , , and . IEEE Access, (2020)FEECA: Design Space Exploration for Low-Latency and Energy-Efficient Capsule Network Accelerators., , , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (4): 716-729 (2021)SuperSlash: A Unified Design Space Exploration and Model Compression Methodology for Design of Deep Learning Accelerators With Reduced Off-Chip Memory Access Volume., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 39 (11): 4191-4204 (2020)A Survey on Quantum Machine Learning: Current Trends, Challenges, Opportunities, and the Road Ahead., , , and . CoRR, (2023)MedAide: Leveraging Large Language Models for On-Premise Medical Assistance on Edge Devices., , , and . CoRR, (2024)PEAL: Probabilistic Error Analysis Methodology for Low-power Approximate Adders., , , and . ACM J. Emerg. Technol. Comput. Syst., 17 (1): 1:1-1:37 (2020)DAP: A Dynamic Adversarial Patch for Evading Person Detectors., , , , and . CoRR, (2023)PoisonedGNN: Backdoor Attack on Graph Neural Networks-based Hardware Security Systems., , , , and . CoRR, (2023)