Picture for Domenic Forte

Domenic Forte

Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization

Add code
Jan 22, 2024
Figure 1 for Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization
Figure 2 for Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization
Figure 3 for Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization
Figure 4 for Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization
Viaarxiv icon

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

Add code
Apr 21, 2022
Figure 1 for A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
Figure 2 for A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
Figure 3 for A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
Figure 4 for A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
Viaarxiv icon

Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images

Add code
Apr 28, 2020
Figure 1 for Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images
Figure 2 for Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images
Figure 3 for Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images
Figure 4 for Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images
Viaarxiv icon

Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm

Add code
Mar 31, 2020
Figure 1 for Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm
Figure 2 for Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm
Figure 3 for Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm
Figure 4 for Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm
Viaarxiv icon