Evangeline F. Y. Young

Follow

Generating author description...

All published works
Action Title Year Authors
+ PDF Chat TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans 2024 Fangzhou Wang
Qijing Wang
Lilas Alrahis
Bangqi Fu
Shui Jiang
Xiaopeng Zhang
Ozgur Sinanoglu
Tsung-Yi Ho
Evangeline F. Y. Young
Johann Knechtel
+ PDF Chat An Open-Source Fast Parallel Routing Approach for Commercial FPGAs 2024 Xinshi Zang
W.-T. Lin
Shiju Lin
Jinwei Liu
Evangeline F. Y. Young
+ PDF Chat The Dawn of AI-Native EDA: Promises and Challenges of Large Circuit Models 2024 Lei Chen
Yiqi Chen
Zhufei Chu
Wenji Fang
Tsung-Yi Ho
Yu Huang
Sadaf Khan
Min Li
Xingquan Li
Yun Liang
+ Security Closure of IC Layouts Against Hardware Trojans 2023 Fangzhou Wang
Qijing Wang
Bangqi Fu
Shui Jiang
Xiaopeng Zhang
Lilas Alrahis
Ozgur Sinanoglu
Johann Knechtel
Tsung-Yi Ho
Evangeline F. Y. Young
+ Security Closure of IC Layouts Against Hardware Trojans 2022 Fangzhou Wang
Qijing Wang
Bangqi Fu
Shui Jiang
Xiaopeng Zhang
Lilas Alrahis
Ozgur Sinanoglu
Johann Knechtel
Tsung-Yi Ho
Evangeline F. Y. Young
+ PDF Chat Adversarial Perturbation Attacks on ML-based CAD 2020 Kang Liu
Haoyu Yang
Yuzhe Ma
Benjamin Tan
Bei Yu
Evangeline F. Y. Young
Ramesh Karri
Siddharth Garg
+ PDF Chat Are Adversarial Perturbations a Showstopper for ML-Based CAD? A Case Study on CNN-Based Lithographic Hotspot Detection. 2019 Kang Liu
Haoyu Yang
Yuzhe Ma
Benjamin Tan
Bei Yu
Evangeline F. Y. Young
Ramesh Karri
Siddharth Garg
+ PDF Chat Attacking Split Manufacturing from a Deep Learning Perspective 2019 Haocheng Li
Satwik Patnaik
Abhrajit Sengupta
Haoyu Yang
Johann Knechtel
Bei Yu
Evangeline F. Y. Young
Ozgur Sinanoglu
Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ Ensemble Adversarial Training: Attacks and Defenses 2017 Florian Tramèr
Alexey Kurakin
Nicolas Papernot
Ian Goodfellow
Dan Boneh
Patrick McDaniel
2
+ PDF Chat Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks 2016 Nicolas Papernot
Patrick McDaniel
Xi Wu
Somesh Jha
Ananthram Swami
2
+ Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models 2018 Pouya Samangouei
Maya Kabkab
Rama Chellappa
2
+ Delving into Transferable Adversarial Examples and Black-box Attacks 2016 Yanpei Liu
Xinyun Chen
Chang Liu
Dawn Song
2
+ Methods for interpreting and understanding deep neural networks 2017 Grégoire Montavon
Wojciech Samek
Klaus‐Robert Müller
2
+ PDF Chat Universal Adversarial Perturbations 2017 Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
Pascal Frossard
2
+ PDF Chat Practical Black-Box Attacks against Machine Learning 2017 Nicolas Papernot
Patrick McDaniel
Ian Goodfellow
Somesh Jha
Z. Berkay Celik
Ananthram Swami
2
+ Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks 2018 Weilin Xu
David Evans
Yanjun Qi
2
+ Countering Adversarial Images using Input Transformations 2017 Chuan Guo
Mayank Rana
Moustapha Cissé
Laurens van der Maaten
2
+ PDF Chat SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation 2018 Prabuddha Chakraborty
Jonathan Cruz
Swarup Bhunia
1
+ On Detecting Adversarial Perturbations 2017 Jan Hendrik Metzen
Tim Genewein
Volker Fischer
Bastian Bischoff
1
+ Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks 2018 Kang Liu
Brendan Dolan-Gavitt
Siddharth Garg
1
+ TensorFlow: A system for large-scale machine learning 2016 Martı́n Abadi
Paul Barham
Jianmin Chen
Zhifeng Chen
Andy Davis
Jay B. Dean
Matthieu Devin
Sanjay Ghemawat
Geoffrey Irving
Michael Isard
1
+ PDF Chat Developing synthesis flows without human knowledge 2018 Cunxi Yu
Houping Xiao
Giovanni De Micheli
1
+ PDF Chat Deceptive Logic Locking for Hardware Integrity Protection Against Machine Learning Attacks 2021 Dominik Šišejković
Farhad Merchant
Lennart M. Reimann
Rainer Leupers
1
+ PDF Chat Wild patterns: Ten years after the rise of adversarial machine learning 2018 Battista Biggio
Fabio Roli
1
+ PDF Chat MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction 2022 Lilas Alrahis
Satwik Patnaik
Muhammad Shafique
Ozgur Sinanoglu
1
+ Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering 2018 Bryant Chen
Wilka Carvalho
Nathalie Baracaldo
Heiko Ludwig
Ben Edwards
Taesung Lee
Ian Molloy
Biplav Srivastava
1
+ Towards Deep Learning Models Resistant to Adversarial Attacks 2017 Aleksander Mądry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
1
+ Proceedings of the 24th international conference on Machine learning 2007 John Langford
Joëlle Pineau
1
+ Stochastic Activation Pruning for Robust Adversarial Defense 2018 Guneet S. Dhillon
Kamyar Azizzadenesheli
Zachary C. Lipton
Jeremy Bernstein
Jean Kossaifi
Aran Khanna
Anima Anandkumar
1
+ Explaining and Harnessing Adversarial Examples 2014 Ian Goodfellow
Jonathon Shlens
Christian Szegedy
1
+ PDF Chat Deep Residual Learning for Image Recognition 2016 Kaiming He
Xiangyu Zhang
Shaoqing Ren
Jian Sun
1
+ Adversarial examples in the physical world 2016 Alexey Kurakin
Ian Goodfellow
Samy Bengio
1
+ On Detecting Adversarial Perturbations 2016 Jan Hendrik Metzen
Tim Genewein
Volker Fischer
Bastian Bischoff
1
+ Towards Deep Learning Models Resistant to Adversarial Attacks 2017 Aleksander Mądry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
1
+ Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning 2018 Battista Biggio
Fabio Roli
1
+ PDF Chat Developing Synthesis Flows Without Human Knowledge 2018 Cunxi Yu
Houping Xiao
Giovanni De Micheli
1
+ PDF Chat Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks 2018 Kang Liu
Brendan Dolan-Gavitt
Siddharth Garg
1