Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
We explore this threat and develop PoisonedGNN as the first backdoor attack on GNNs in the context of hardware design. We design and inject ...
Missing: tt{ | Show results with:tt{
Mar 24, 2023 · Proposed backdoor attack against GNN- based hardware security systems. Malicious circuits evade detection due to the injected backdoor triggers, ...
Missing: tt{ | Show results with:tt{
People also ask
May 2, 2023 · Graph neural networks (GNNs) have shown great success in detecting intellectual property (IP) piracy and hardware Trojans (HTs).
Graph Neural Networks for Hardware Vulnerability Analysis— Can ... $\tt{PoisonedGNN}$: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems.
$\tt{PoisonedGNN}$: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems · Computer Science, Engineering. IEEE Transactions on Computers.
Oct 1, 2023 · Graph neural networks (GNNs) have shown great success in detecting intellectual property (IP) piracy and hardware Trojans (HTs).
Missing: tt{ | Show results with:tt{
Proposed backdoor attack against GNN-based hardware security systems. Malicious circuits evade detection due to the injected backdoor triggers, reducing trust ...
$\tt{PoisonedGNN}$: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems ... ReLIEF: A Reinforcement-Learning-Based Real-Time Task Assignment ...
Jan 5, 2024 · We explore this threat and develop PoisonedGNN as the first backdoor attack on GNNs in the context of hardware design. We design and inject ...
Missing: tt{ | Show results with:tt{
May 11, 2024 · $\tt{PoisonedGNN}$: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems. IEEE Trans. Computers, 2023, Lilas Alrahis ...