We explore this threat and develop PoisonedGNN as the first backdoor attack on GNNs in the context of hardware design. We design and inject ...
Missing: tt{ | Show results with:tt{
Mar 24, 2023 · Proposed backdoor attack against GNN- based hardware security systems. Malicious circuits evade detection due to the injected backdoor triggers, ...
Missing: tt{ | Show results with:tt{
People also ask
What is backdoor attack in neural network?
What is a backdoor attack?
What is a typical method used in a backdoor attack on an AI model?
What are three different ways to defend yourself against a backdoor attack?
May 2, 2023 · Graph neural networks (GNNs) have shown great success in detecting intellectual property (IP) piracy and hardware Trojans (HTs).
[PDF] Hardware Trojan Detection using Graph Neural Networks
www.semanticscholar.org › paper › Hard...
Graph Neural Networks for Hardware Vulnerability Analysis— Can ... $\tt{PoisonedGNN}$: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems.
$\tt{PoisonedGNN}$: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems · Computer Science, Engineering. IEEE Transactions on Computers.
Oct 1, 2023 · Graph neural networks (GNNs) have shown great success in detecting intellectual property (IP) piracy and hardware Trojans (HTs).
Missing: tt{ | Show results with:tt{
Proposed backdoor attack against GNN-based hardware security systems. Malicious circuits evade detection due to the injected backdoor triggers, reducing trust ...
$\tt{PoisonedGNN}$: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems ... ReLIEF: A Reinforcement-Learning-Based Real-Time Task Assignment ...
Jan 5, 2024 · We explore this threat and develop PoisonedGNN as the first backdoor attack on GNNs in the context of hardware design. We design and inject ...
Missing: tt{ | Show results with:tt{
May 11, 2024 · $\tt{PoisonedGNN}$: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems. IEEE Trans. Computers, 2023, Lilas Alrahis ...