default search action
Raj Gautam Dutta
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Weimin Fu, Shijie Li, Yifang Zhao, Haocheng Ma, Raj Gautam Dutta, Xuan Zhang, Kaichen Yang, Yier Jin, Xiaolong Guo:
Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge. ASPDAC 2024: 349-354 - [c14]Zhaoxiang Liu, Ning Luo, Samuel Judson, Raj Gautam Dutta, Xiaolong Guo, Mark Santolucito:
Poster: BlindMarket: A Trustworthy Chip Designs Marketplace for IP Vendors and Users. CCS 2024: 5048-5050 - [i3]Weimin Fu, Kaichen Yang, Raj Gautam Dutta, Xiaolong Guo, Gang Qu:
LLM4SecHW: Leveraging Domain Specific Large Language Model for Hardware Debugging. CoRR abs/2401.16448 (2024) - [i2]Weimin Fu, Shijie Li, Yifang Zhao, Haocheng Ma, Raj Gautam Dutta, Xuan Zhang, Kaichen Yang, Yier Jin, Xiaolong Guo:
Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge. CoRR abs/2402.01728 (2024) - 2023
- [c13]Weimin Fu, Kaichen Yang, Raj Gautam Dutta, Xiaolong Guo, Gang Qu:
LLM4SecHW: Leveraging Domain-Specific Large Language Model for Hardware Debugging. AsianHOST 2023: 1-6 - 2022
- [j9]Raj Gautam Dutta, Yaodan Hu, Feng Yu, Teng Zhang, Yier Jin:
Design and Analysis of Secure Distributed Estimator for Vehicular Platooning in Adversarial Environment. IEEE Trans. Intell. Transp. Syst. 23(4): 3418-3429 (2022) - 2021
- [j8]Max Panoff, Raj Gautam Dutta, Yaodan Hu, Kaichen Yang, Yier Jin:
On Sensor Security in the Era of IoT and CPS. SN Comput. Sci. 2(1): 51 (2021) - 2020
- [j7]Feng Yu, Raj Gautam Dutta, Teng Zhang, Yaodan Hu, Yier Jin:
Fast Attack-Resilient Distributed State Estimator for Cyber-Physical Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3555-3565 (2020) - [c12]Yaodan Hu, Haoqi Shan, Raj Gautam Dutta, Yier Jin:
Protecting Platoons from Stealthy Jamming Attack. AsianHOST 2020: 1-6 - [i1]Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, Xiaorui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou:
A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems. CoRR abs/2008.06926 (2020)
2010 – 2019
- 2019
- [j6]Jiaji He, Xiaolong Guo, Travis Meade, Raj Gautam Dutta, Yiqiang Zhao, Yier Jin:
SoC interconnection protection through formal verification. Integr. 64: 143-151 (2019) - [c11]Raj Gautam Dutta, Teng Zhang, Yier Jin:
Resilient Distributed Filter for State Estimation of Cyber-Physical Systems Under Attack. ACC 2019: 5141-5147 - [c10]Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Mark M. Tehranipoor, Yier Jin:
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment. HOST 2019: 91-100 - 2018
- [c9]Raj Gautam Dutta, Feng Yu, Teng Zhang, Yaodan Hu, Yier Jin:
Security for safety: a path toward building trusted autonomous vehicles. ICCAD 2018: 92 - 2017
- [j5]Xiaolong Guo, Raj Gautam Dutta, Yier Jin:
Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems. IEEE Trans. Inf. Forensics Secur. 12(2): 405-417 (2017) - [j4]Yier Jin, Xiaolong Guo, Raj Gautam Dutta, Mohammad-Mahdi Bidmeshki, Yiorgos Makris:
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part I: Framework Fundamentals. IEEE Trans. Inf. Forensics Secur. 12(10): 2416-2429 (2017) - [j3]Mohammad-Mahdi Bidmeshki, Xiaolong Guo, Raj Gautam Dutta, Yier Jin, Yiorgos Makris:
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part II: Framework Automation. IEEE Trans. Inf. Forensics Secur. 12(10): 2430-2443 (2017) - [j2]Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, Yier Jin:
Automatic Code Converter Enhanced PCH Framework for SoC Trust Verification. IEEE Trans. Very Large Scale Integr. Syst. 25(12): 3390-3400 (2017) - [c8]Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Yier Jin:
PCH framework for IP runtime security verification. AsianHOST 2017: 79-84 - [c7]Raj Gautam Dutta, Xiaolong Guo, Teng Zhang, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Estimation of Safe Sensor Measurements of Autonomous System Under Attack. DAC 2017: 46:1-46:6 - 2016
- [c6]Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, Yier Jin:
Scalable SoC trust verification using integrated theorem proving and model checking. HOST 2016: 124-129 - [c5]Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, Yier Jin:
Automatic RTL-to-Formal Code Converter for IP Security Formal Verification. MTV 2016: 35-38 - [c4]Raj Gautam Dutta, Xiaolong Guo, Yier Jin:
Quantifying trust in autonomous system under uncertainties. SoCC 2016: 362-367 - 2015
- [c3]Xiaolong Guo, Raj Gautam Dutta, Yier Jin, Farimah Farahmandi, Prabhat Mishra:
Pre-silicon security verification and validation: a formal perspective. DAC 2015: 145:1-145:6 - [c2]Xiaolong Guo, Raj Gautam Dutta, Yier Jin:
Hierarchy-Preserving Formal Verification Methods for Pre-silicon Security Assurance. MTV 2015: 48-53 - 2012
- [j1]Sumit Kumar Jha, Raj Gautam Dutta, Christopher James Langmead, Susmit Jha, Emily Sassano:
Synthesis of insulin pump controllers from safety specifications using Bayesian model validation. Int. J. Bioinform. Res. Appl. 8(3/4): 263-285 (2012) - [c1]Faraz Hussain, Raj Gautam Dutta, Sumit Kumar Jha, Christopher James Langmead, Susmit Jha:
Parameter discovery for stochastic biological models against temporal behavioral specifications using an SPRT based Metric for simulated annealing. ICCABS 2012: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint