On Trojan Signatures in Large Language Models of Code Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour | Published: 2024-02-23 | Updated: 2024-03-07 LLM SecurityTrojan Horse SignatureTrojan Detection 2024.02.23 2025.05.27 Literature Database
Uncertainty-Aware Hardware Trojan Detection Using Multimodal Deep Learning Authors: Rahul Vishwakarma, Amin Rezaei | Published: 2024-01-15 | Updated: 2024-01-23 Brier Score Evaluation MethodTrojan DetectionQuantification of Uncertainty 2024.01.15 2025.05.27 Literature Database
Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection Authors: Rahul Vishwakarma, Amin Rezaei | Published: 2023-10-14 Dataset GenerationTrojan DetectionQuantification of Uncertainty 2023.10.14 2025.05.28 Literature Database
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training Authors: Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa | Published: 2022-05-27 Security AssuranceTrojan DetectionFeature Extraction Method 2022.05.27 2025.05.28 Literature Database
Automatic Hardware Trojan Insertion using Machine Learning Authors: Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, Swarup Bhunia | Published: 2022-04-18 Algorithm DesignTrojan DetectionMachine Learning Method 2022.04.18 2025.05.28 Literature Database
An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks Authors: Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar | Published: 2022-04-08 Trojan Horse SignatureTrojan DetectionBackdoor Attack 2022.04.08 2025.05.28 Literature Database
FuCE: Fuzzing+Concolic Execution guided Trojan Detection in Synthesizable Hardware Designs Authors: Mukta Debnath, Animesh Basak Chowdhury, Debasri Saha, Susmita Sur-Kolay | Published: 2021-11-01 Security TestingTrojan DetectionThreat modeling 2021.11.01 2025.05.28 Literature Database
TAD: Trigger Approximation based Black-box Trojan Detection for AI Authors: Xinqiao Zhang, Huili Chen, Farinaz Koushanfar | Published: 2021-02-03 | Updated: 2021-04-20 WatermarkingTrojan DetectionBackdoor Attack 2021.02.03 2025.05.28 Literature Database
CLEANN: Accelerated Trojan Shield for Embedded Neural Networks Authors: Mojan Javaheripi, Mohammad Samragh, Gregory Fields, Tara Javidi, Farinaz Koushanfar | Published: 2020-09-04 Trojan DetectionMembership InferenceImage Processing 2020.09.04 2025.05.28 Literature Database
Live Trojan Attacks on Deep Neural Networks Authors: Robby Costales, Chengzhi Mao, Raphael Norwitz, Bryan Kim, Junfeng Yang | Published: 2020-04-22 | Updated: 2020-05-27 Trojan DetectionAttack MethodDeep Learning Technology 2020.04.22 2025.05.28 Literature Database