• Hasan M, Hoque T, Ganji F, Woodard D, Forte D and Shomaji S. (2024). A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication. Journal of Hardware and Systems Security. 10.1007/s41635-024-00153-7. 8:3. (160-173). Online publication date: 1-Sep-2024.

    https://link.springer.com/10.1007/s41635-024-00153-7

  • Horváth P, Lauret D, Liu Z and Batina L. SoK. Proceedings of the 33rd USENIX Conference on Security Symposium. (3403-3422).

    /doi/10.5555/3698900.3699091

  • Oliynyk D, Mayer R and Rauber A. (2023). I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences. ACM Computing Surveys. 55:14s. (1-41). Online publication date: 31-Dec-2024.

    https://doi.org/10.1145/3595292

  • Chen H and Babar M. (2023). Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges. ACM Computing Surveys. 10.1145/3638531.

    https://dl.acm.org/doi/10.1145/3638531

  • Nyako K, Devkota S, Li F and Borra V. (2023). Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges. Electronics. 10.3390/electronics12224618. 12:22. (4618).

    https://www.mdpi.com/2079-9292/12/22/4618

  • Amuru D, Zahra A, Vudumula H, Cherupally P, Gurram S, Ahmad A and Abbas Z. (2023). AI/ML algorithms and applications in VLSI design and technology. Integration. 10.1016/j.vlsi.2023.06.002. 93. (102048). Online publication date: 1-Nov-2023.

    https://linkinghub.elsevier.com/retrieve/pii/S0167926023000901

  • Vennila A, Balambigai S, Arulmurugan A, Hema M, Kamali M and Kishore M. (2023). XG Boost Algorithm based Hardware Trojan Detection in Hardware Circuits 2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT). 10.1109/ICECCT56650.2023.10179698. 978-1-6654-9360-4. (1-5).

    https://ieeexplore.ieee.org/document/10179698/

  • Farahmandi F, Rahman M, Rajendran S and Tehranipoor M. (2023). The Future of CAD for Hardware Security. CAD for Hardware Security. 10.1007/978-3-031-26896-0_18. (397-403).

    https://link.springer.com/10.1007/978-3-031-26896-0_18

  • Farahmandi F, Rahman M, Rajendran S and Tehranipoor M. (2023). CAD for Machine Learning in Hardware Security. CAD for Hardware Security. 10.1007/978-3-031-26896-0_10. (211-230).

    https://link.springer.com/10.1007/978-3-031-26896-0_10

  • Sisejkovic D and Leupers R. (2023). Research Directions. Logic Locking. 10.1007/978-3-031-19123-7_11. (159-161).

    https://link.springer.com/10.1007/978-3-031-19123-7_11

  • Takatoi G, Sugawara T, Sakiyama K, Hara-Azumi Y and Li Y. (2022). The Limits of SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks. Applied Sciences. 10.3390/app12094135. 12:9. (4135).

    https://www.mdpi.com/2076-3417/12/9/4135

  • Huraj L, Horak T, Strelec P and Tanuska P. (2021). Mitigation against DDoS Attacks on an IoT-Based Production Line Using Machine Learning. Applied Sciences. 10.3390/app11041847. 11:4. (1847).

    https://www.mdpi.com/2076-3417/11/4/1847