Picture for Abdel-Hameed A. Badawy

Abdel-Hameed A. Badawy

TrojanWhisper: Evaluating Pre-trained LLMs to Detect and Localize Hardware Trojans

Add code
Dec 10, 2024
Viaarxiv icon

Hiding in Plain Sight: Reframing Hardware Trojan Benchmarking as a Hide&Seek Modification

Add code
Oct 21, 2024
Viaarxiv icon

P-YOLOv8: Efficient and Accurate Real-Time Detection of Distracted Driving

Add code
Oct 21, 2024
Viaarxiv icon

Cluster-BPI: Efficient Fine-Grain Blind Power Identification for Defending against Hardware Thermal Trojans in Multicore SoCs

Add code
Sep 27, 2024
Figure 1 for Cluster-BPI: Efficient Fine-Grain Blind Power Identification for Defending against Hardware Thermal Trojans in Multicore SoCs
Figure 2 for Cluster-BPI: Efficient Fine-Grain Blind Power Identification for Defending against Hardware Thermal Trojans in Multicore SoCs
Figure 3 for Cluster-BPI: Efficient Fine-Grain Blind Power Identification for Defending against Hardware Thermal Trojans in Multicore SoCs
Figure 4 for Cluster-BPI: Efficient Fine-Grain Blind Power Identification for Defending against Hardware Thermal Trojans in Multicore SoCs
Viaarxiv icon

TrojanForge: Adversarial Hardware Trojan Examples with Reinforcement Learning

Add code
May 24, 2024
Viaarxiv icon

Graph Neural Networks for Parameterized Quantum Circuits Expressibility Estimation

Add code
May 13, 2024
Viaarxiv icon

The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection

Add code
Feb 27, 2024
Viaarxiv icon

Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach

Add code
Apr 26, 2023
Figure 1 for Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach
Figure 2 for Multi-criteria Hardware Trojan Detection: A Reinforcement Learning Approach
Viaarxiv icon

Hardware Trojan Insertion Using Reinforcement Learning

Add code
Apr 09, 2022
Figure 1 for Hardware Trojan Insertion Using Reinforcement Learning
Figure 2 for Hardware Trojan Insertion Using Reinforcement Learning
Figure 3 for Hardware Trojan Insertion Using Reinforcement Learning
Figure 4 for Hardware Trojan Insertion Using Reinforcement Learning
Viaarxiv icon