A novel digital twin framework for aeroengine performance diagnosis

Z Wang, Y Wang, X Wang, K Yang, Y Zhao - Aerospace, 2023 - mdpi.com
Aeroengine performance diagnosis technology is essential for ensuring flight safety and
reliability. The complexity of engine performance and the strong coupling of fault …

Robust hardware trojan detection method by unsupervised learning of electromagnetic signals

D Lee, J Lee, Y Jung, J Kauh… - IEEE Transactions on Very …, 2024 - ieeexplore.ieee.org
This article explores the threat posed by Hardware Trojans (HTs), malicious circuits
clandestinely embedded in hardware akin to software backdoors. Activation by attackers …

Data augmented hardware trojan detection using label spreading algorithm based transductive learning for edge computing-assisted IoT devices

V Sankar, MN Devi, M Jayakumar - IEEE Access, 2022 - ieeexplore.ieee.org
IoT devices handle a large amount of information including sensitive information pertaining
to the deployed application. Such a scenario, makes IoT devices susceptible to various …

Deep transfer learning approach for digital circuits vulnerability analysis

MM Rahimifar, H Jahanirad, M Fathi - Expert Systems with Applications, 2024 - Elsevier
Hardware Trojans (HT) are the most malicious components attacking modern integrated
circuits (ICs). Information leakage, incorrect functionality, and overheating are the major …

Energy-efficient adaptive sensing for Cognitive Radio Sensor Network in the presence of Primary User Emulation Attack

SK Ram - Computers and Electrical Engineering, 2023 - Elsevier
Abstract A Cognitive Radio Sensor Network (CRSN) is a promising technology incorporating
cognitive radio in traditional wireless sensor networks. In general, Primary User Emulation …

Deep Learning Methods to Prevent Various Cyberattacks in Cloud Environment

QK Kadhim, OF Alwan… - Revue d'Intelligence …, 2024 - search.proquest.com
Cloud computing offers many benefits, but it also presents new cybersecurity challenges that
must be addressed to ensure data protection in the cloud environment. Governments and …

Graph based heterogeneous feature extraction for enhanced hardware Trojan detection at gate-level using optimized XGBoost algorithm

MN Devi, V Sankar - Measurement, 2023 - Elsevier
The requirement of reduced production costs in the domain of integrated circuit (IC)
manufacturing and constrained time-to-market are met at the cost of a plethora of security …

Smart Safety Helmet for Protecting Lives of Workers in Mining Industry

M Priyatharishini, MT Rani - 2023 7th International Conference …, 2023 - ieeexplore.ieee.org
Mining industry is considered as a very significant sector in business field comprising
various complicated process and situations which leads to safety critical aspects in industry …

Crime Prediction using Machine Learning

S Sridharan, N Srish, S Vigneswaran… - … on Internet of Things, 2024 - publications.eai.eu
The process of researching crime patterns and trends in order to find underlying issues and
potential solutions to crime prevention is known as crime analysis. This includes using …

Hardware Trojan vulnerability assessment in digital integrated circuits using learnable classifiers

H Jahanirad, M Fathi - AUT Journal of Electrical Engineering, 2024 - eej.aut.ac.ir
In the current distributed integrated circuits (IC) industry, the possibility of adversarial
hardware attacks cannot be ignored. Hardware Trojans (HT) attacks may lead to information …