Hardware Trojan Insertion Using Reinforcement Learning.
Amin SarihiAhmad PatooghyPeter JamiesonAbdel-Hameed A. BadawyPublished in: CoRR (2022)
Keyphrases
- reinforcement learning
- low cost
- real time
- hardware and software
- function approximation
- optimal policy
- state space
- learning process
- computer systems
- hardware implementation
- learning algorithm
- data mining
- multi agent
- image processing
- transfer learning
- machine learning
- vlsi implementation
- model free
- reinforcement learning algorithms
- computing power
- markov decision processes
- personal computer
- control program
- digital signal processor
- policy search
- temporal difference learning
- single chip
- massively parallel
- general purpose
- information systems
- data sets