Hasan M, Hoque T, Ganji F, Woodard D, Forte D and Shomaji S.
(2024). A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication. Journal of Hardware and Systems Security. 10.1007/s41635-024-00153-7. 8:3. (160-173). Online publication date: 1-Sep-2024.
Oliynyk D, Mayer R and Rauber A.
(2023). I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences. ACM Computing Surveys. 55:14s. (1-41). Online publication date: 31-Dec-2024.
Chen H and Babar M.
(2023). Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges. ACM Computing Surveys. 10.1145/3638531.
Nyako K, Devkota S, Li F and Borra V.
(2023). Building Trust in Microelectronics: A Comprehensive Review of Current Techniques and Adoption Challenges. Electronics. 10.3390/electronics12224618. 12:22. (4618).
Amuru D, Zahra A, Vudumula H, Cherupally P, Gurram S, Ahmad A and Abbas Z.
(2023). AI/ML algorithms and applications in VLSI design and technology. Integration. 10.1016/j.vlsi.2023.06.002. 93. (102048). Online publication date: 1-Nov-2023.
Vennila A, Balambigai S, Arulmurugan A, Hema M, Kamali M and Kishore M.
(2023). XG Boost Algorithm based Hardware Trojan Detection in Hardware Circuits 2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT). 10.1109/ICECCT56650.2023.10179698. 978-1-6654-9360-4. (1-5).
Farahmandi F, Rahman M, Rajendran S and Tehranipoor M.
(2023). CAD for Machine Learning in Hardware Security. CAD for Hardware Security. 10.1007/978-3-031-26896-0_10. (211-230).
Takatoi G, Sugawara T, Sakiyama K, Hara-Azumi Y and Li Y.
(2022). The Limits of SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks. Applied Sciences. 10.3390/app12094135. 12:9. (4135).
Huraj L, Horak T, Strelec P and Tanuska P.
(2021). Mitigation against DDoS Attacks on an IoT-Based Production Line Using Machine Learning. Applied Sciences. 10.3390/app11041847. 11:4. (1847).