Login / Signup
Discerning Limitations of GNN-based Attacks on Logic Locking.
Armin Darjani
Nima Kavand
Shubham Rai
Akash Kumar
Published in:
DAC (2023)
Keyphrases
</>
countermeasures
logic programming
deontic logic
database systems
modal logic
malicious attacks
multi valued
concurrency control
traffic analysis
stepping stones
information systems
malicious users
cryptographic protocols
computer security
automated reasoning
logic programs
data model