Alert button
Picture for Domenic Forte

Domenic Forte

Alert button

Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization

Add code
Bookmark button
Alert button
Jan 22, 2024
Hanqiu Wang, Max Panoff, Zihao Zhan, Shuo Wang, Christophe Bobda, Domenic Forte

Viaarxiv icon

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

Add code
Bookmark button
Alert button
Apr 21, 2022
David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte

Figure 1 for A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
Figure 2 for A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
Figure 3 for A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
Figure 4 for A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
Viaarxiv icon

Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images

Add code
Bookmark button
Alert button
Apr 28, 2020
Ronald Wilson, Navid Asadizanjani, Domenic Forte, Damon L. Woodard

Figure 1 for Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images
Figure 2 for Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images
Figure 3 for Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images
Figure 4 for Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images
Viaarxiv icon

Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm

Add code
Bookmark button
Alert button
Mar 31, 2020
Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte

Figure 1 for Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm
Figure 2 for Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm
Figure 3 for Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm
Figure 4 for Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm
Viaarxiv icon