Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security.
Wenye LiuChip-Hong ChangXueyang WangChen LiuJason M. FungMohammad EbrahimabadiNaghmeh KarimiXingyu MengKanad BasuPublished in: IEEE J. Emerg. Sel. Topics Circuits Syst. (2021)
Keyphrases
- machine learning
- low cost
- hardware and software
- random number generator
- real time
- machine learning methods
- intrusion detection
- network security
- learning algorithm
- feature selection
- information security
- knowledge acquisition
- security issues
- machine learning approaches
- text classification
- trusted computing
- security requirements
- data mining
- computer security
- artificial intelligence
- protection scheme
- image processing
- security policies
- computer vision
- embedded systems
- inductive logic programming
- natural language processing
- learning tasks
- decision trees
- model selection
- computer systems
- active learning
- information extraction
- supervised learning
- security analysis
- security protocols
- credit card
- protection schemes
- massively parallel
- explanation based learning
- statistical databases
- inductive learning
- learning systems
- computational intelligence
- knowledge representation
- data analysis
- computer science