Search Results for author: Setareh Rafatirad

Found 6 papers, 2 papers with code

A Neural Network-based SAT-Resilient Obfuscation Towards Enhanced Logic Locking

no code implementations13 Sep 2022 Rakibul Hassan, Gaurav Kolhe, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

Logic obfuscation is introduced as a pivotal defense against multiple hardware threats on Integrated Circuits (ICs), including reverse engineering (RE) and intellectual property (IP) theft.

Deep Multi-attributed Graph Translation with Node-Edge Co-evolution

1 code implementation22 Mar 2020 Xiaojie Guo, Liang Zhao, Cameron Nowzari, Setareh Rafatirad, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

Then, a spectral graph regularization based on our non-parametric graph Laplacian is proposed in order to learn and maintain the consistency of the predicted nodes and edges.

Translation

Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design

no code implementations29 Jul 2019 Hosein Mohammadi Makrani, Farnoud Farahmand, Hossein Sayadi, Sara Bondi, Sai Manoj Pudukotai Dinakarrao, Liang Zhao, Avesta Sasan, Houman Homayoun, Setareh Rafatirad

HLS tools offer a plethora of techniques to optimize designs for both area and performance, but resource usage and timing reports of HLS tools mostly deviate from the post-implementation results.

An Exhaustive Analysis of Lazy vs. Eager Learning Methods for Real-Estate Property Investment

no code implementations ICLR 2019 Setareh Rafatirad, Maryam Heidari

Based on our study, lazy models like KStar lead to higher accuracy and lower prediction error compared to eager methods like J48 and LR.

4k Clustering

Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning

no code implementations14 Feb 2019 Zhiqian Chen, Gaurav Kolhe, Setareh Rafatirad, Sai Manoj P. D., Houman Homayoun, Liang Zhao, Chang-Tien Lu

Deobfuscation runtime could have a large span ranging from few milliseconds to thousands of years or more, depending on the number and layouts of the ICs and camouflaged gates.

Cannot find the paper you are looking for? You can Submit a new open access paper.