Login / Signup
$\tt{PoisonedGNN}$: Backdoor Attack on Graph Neural Networks-Based Hardware Security Systems.
Lilas Alrahis
Satwik Patnaik
Muhammad Abdullah Hanif
Muhammad Shafique
Ozgur Sinanoglu
Published in:
IEEE Trans. Computers (2023)
Keyphrases
</>
security systems
neural network
rule based systems
real time
attack graph
security mechanisms
biometric data
low cost
pattern recognition
computer systems
multimodal biometrics
artificial neural networks
fuzzy logic
data management
secret key
resource constrained
machine learning