Ikuti
Raj Gautam Dutta
Raj Gautam Dutta
Silicon Assurance
Email yang diverifikasi di siliconassurance.com - Beranda
Judul
Dikutip oleh
Dikutip oleh
Tahun
Survey of machine learning methods for detecting false data injection attacks in power systems
A Sayghe, Y Hu, I Zografopoulos, XR Liu, RG Dutta, Y Jin, C Konstantinou
IET Smart Grid 3 (5), 581-595, 2020
1542020
Pre-silicon security verification and validation: A formal perspective
X Guo, RG Dutta, Y Jin, F Farahmandi, P Mishra
Proceedings of the 52nd annual design automation conference, 1-6, 2015
1032015
Scalable SoC trust verification using integrated theorem proving and model checking
X Guo, RG Dutta, P Mishra, Y Jin
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
612016
Qif-verilog: Quantitative information-flow based hardware description languages for pre-silicon security assessment
X Guo, RG Dutta, J He, MM Tehranipoor, Y Jin
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
552019
Estimation of safe sensor measurements of autonomous system under attack
RG Dutta, X Guo, T Zhang, K Kwiat, C Kamhoua, L Njilla, Y Jin
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
492017
Data secrecy protection through information flow tracking in proof-carrying hardware IP—Part I: Framework fundamentals
Y Jin, X Guo, RG Dutta, MM Bidmeshki, Y Makris
IEEE Transactions on Information Forensics and Security 12 (10), 2416-2429, 2017
382017
Security for safety: a path toward building trusted autonomous vehicles
RG Dutta, F Yu, T Zhang, Y Hu, Y Jin
Proceedings of the International Conference on Computer-Aided Design, 92, 2018
342018
Design and analysis of secure distributed estimator for vehicular platooning in adversarial environment
RG Dutta, Y Hu, F Yu, T Zhang, Y Jin
IEEE Transactions on Intelligent Transportation Systems 23 (4), 3418-3429, 2020
332020
Data secrecy protection through information flow tracking in proof-carrying hardware IP—Part II: Framework automation
MM Bidmeshki, X Guo, RG Dutta, Y Jin, Y Makris
IEEE Transactions on Information Forensics and Security 12 (10), 2430-2443, 2017
292017
Eliminating the hardware-software boundary: A proof-carrying approach for trust evaluation on computer systems
X Guo, RG Dutta, Y Jin
IEEE Transactions on Information Forensics and Security 12 (2), 405-417, 2016
282016
LLM4SecHW: Leveraging domain-specific large language model for hardware debugging
W Fu, K Yang, RG Dutta, X Guo, G Qu
2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2023
272023
SoC interconnection protection through formal verification
J He, X Guo, T Meade, RG Dutta, Y Zhao, Y Jin
Integration 64, 143-151, 2019
272019
Automatic code converter enhanced PCH framework for SoC trust verification
X Guo, RG Dutta, P Mishra, Y Jin
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (12 …, 2017
252017
On sensor security in the era of IoT and CPS
M Panoff, RG Dutta, Y Hu, K Yang, Y Jin
SN Computer Science 2 (1), 51, 2021
222021
Fast attack-resilient distributed state estimator for cyber-physical systems
F Yu, RG Dutta, T Zhang, Y Hu, Y Jin
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
212020
Hardware phi-1.5 b: A large language model encodes hardware domain specific knowledge
W Fu, S Li, Y Zhao, H Ma, R Dutta, X Zhang, K Yang, Y Jin, X Guo
2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC), 349-354, 2024
142024
Quantifying trust in autonomous system under uncertainties
RG Dutta, X Guo, Y Jin
System-on-Chip Conference (SOCC), 2016 29th IEEE International, 362-367, 2016
142016
Resilient distributed filter for state estimation of cyber-physical systems under attack
RG Dutta, T Zhang, Y Jin
2019 American Control Conference (ACC), 5141-5147, 2019
132019
Hierarchy-preserving formal verification methods for pre-silicon security assurance
X Guo, RG Dutta, Y Jin
2015 16th International Workshop on Microprocessor and SOC Test and …, 2015
132015
Synthesis of insulin pump controllers from safety specifications using bayesian model validation
SK Jha, RG Dutta, CJ Langmead, S Jha, E Sassano
International journal of bioinformatics research and applications 8 (3-4 …, 2012
122012
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20