Fatemeh Ganji
Orcid: 0000-0003-0151-1307
According to our database1,
Fatemeh Ganji
authored at least 60 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication.
J. Hardw. Syst. Secur., September, 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
ACM J. Emerg. Technol. Comput. Syst., October, 2023
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation.
ACM Trans. Design Autom. Electr. Syst., March, 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions.
IACR Cryptol. ePrint Arch., 2023
2022
Security and Artificial Intelligence, 2022
Security and Artificial Intelligence, 2022
ScatterVerif: Verification of Electronic Boards Using Reflection Response of Power Distribution Network.
ACM J. Emerg. Technol. Comput. Syst., 2022
HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation.
CoRR, 2022
HWGN<sup>2</sup>: Side-Channel Protected NNs Through Secure and Private Function Evaluation.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022
Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities.
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022
2021
An Analysis of Enrollment and Query Attacks on Hierarchical Bloom Filter-Based Biometric Systems.
IEEE Trans. Inf. Forensics Secur., 2021
J. Hardw. Syst. Secur., 2021
Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives.
ACM J. Emerg. Technol. Comput. Syst., 2021
Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version).
J. Cryptogr. Eng., 2021
Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners.
CoRR, 2021
InfoNEAT: Information Theory-based NeuroEvolution of Augmenting Topologies for Side-channel Analysis.
CoRR, 2021
Comput. Secur., 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 22nd International Symposium on Quality Electronic Design, 2021
2020
Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions.
CoRR, 2020
Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives.
CoRR, 2020
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020
Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
PUFmeter a Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks.
IEEE Access, 2019
Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, 2019
Proceedings of the IEEE International Test Conference, 2019
RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions.
Proceedings of the 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2019
Hierarchical Bloom Filter Framework for Security, Space-efficiency, and Rapid Query Handling in Biometric Systems.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019
2018
Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems.
CoRR, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
Comput. Networks, 2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Dynamic Resource Provisioning for Energy Efficiency in Wireless Access Networks: A Survey and an Outlook.
IEEE Commun. Surv. Tutorials, 2014
Proceedings of the 7th IFIP Wireless and Mobile Networking Conference, 2014
2013
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013