Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Composed Hardware

biblio

Visible to the public Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems

Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
  • machine learning
  • Scalability
  • Root-of-trust
  • Resiliency
  • resilience
  • pubcrawl
  • Picture archiving and communication systems
  • physically unclonable functions
  • Metrics
  • machine learning-based attacks
  • machine learning-based adversary model
  • Adversary Models
  • logic locking
  • learning (artificial intelligence)
  • Human behavior
  • Hardware
  • Cryptography
  • cryptographic scheme
  • cryptanalysis attacks
  • Composed Hardware
  • Boolean functions
  • Approximation algorithms

Terms of Use  |  ©2023. CPS-VO