From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Alrahis, Lilas
add a person with the name Alrahis, Lilas
 

Другие публикации лиц с тем же именем

PoisonedGNN: Backdoor Attack on Graph Neural Networks-based Hardware Security Systems., , , , и . CoRR, (2023)Security Closure of IC Layouts Against Hardware Trojans., , , , , , , , , и . CoRR, (2022)UNSAIL: Thwarting Oracle-Less Machine Learning Attacks on Logic Locking., , , , , , и . CoRR, (2020)ScanSAT: Unlocking Static and Dynamic Scan Obfuscation., , , , , , и . IEEE Trans. Emerg. Top. Comput., 9 (4): 1867-1882 (2021)Always be Pre-Training: Representation Learning for Network Intrusion Detection with GNNs., , , и . CoRR, (2024)UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction., , , , и . ICCAD, стр. 1-9. IEEE, (2021)TrojanSAINT: Gate-Level Netlist Sampling-Based Inductive Learning for Hardware Trojan Detection., , , и . ISCAS, стр. 1-5. IEEE, (2023)ShapeShifter: Protecting FPGAs from Side-Channel Attacks with Isofunctional Heterogeneous Modules., , , и . IOLTS, стр. 1-7. IEEE, (2023)Titan: Security Analysis of Large-Scale Hardware Obfuscation Using Graph Neural Networks., , , , и . IEEE Trans. Inf. Forensics Secur., (2023)MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAs., , , , , , и . CoRR, (2024)