Embracing Graph Neural Networks for Hardware Security (Invited Paper).
Lilas AlrahisSatwik PatnaikMuhammad ShafiqueOzgur SinanogluPublished in: CoRR (2022)
Keyphrases
- invited paper
- neural network
- low cost
- hardware and software
- information security
- pattern recognition
- graph representation
- artificial neural networks
- intrusion detection
- random number generator
- security policies
- directed graph
- random walk
- security issues
- back propagation
- access control
- genetic algorithm
- weighted graph
- security requirements
- trusted computing
- graph theory
- real time
- network security
- graph structure
- hardware implementation
- statistical databases
- lecture notes
- anomaly detection
- computer systems
- fuzzy logic
- expert systems
- database
- protection scheme