Najmeh Nazari

Orcid: 0000-0003-3094-9439

According to our database1, Najmeh Nazari authored at least 23 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Automated Hardware Logic Obfuscation Framework Using GPT.
CoRR, 2024

Forget and Rewire: Enhancing the Resilience of Transformer-based Models against Bit-Flip Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024

Large Language Models for Code Analysis: Do LLMs Really Do Their Job?
Proceedings of the 33rd USENIX Security Symposium, 2024

LLM-FIN: Large Language Models Fingerprinting Attack on Edge Devices.
Proceedings of the 25th International Symposium on Quality Electronic Design, 2024

Securing On-Chip Learning: Navigating Vulnerabilities and Potential Safeguards in Spiking Neural Network Architectures.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2024

SpecScope: Automating Discovery of Exploitable Spectre Gadgets on Black-Box Microarchitectures.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024

Architectural Whispers: Robust Machine Learning Models Fingerprinting via Frequency Throttling Side-Channels.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

2023
Adversarial Attacks Against Machine Learning-Based Resource Provisioning Systems.
IEEE Micro, 2023

HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion.
CoRR, 2023

Advanced Reinforcement Learning Solution for Clock Skew Engineering: Modified Q-Table Update Technique for Peak Current and IR Drop Minimization.
IEEE Access, 2023

HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Inter-Layer Hybrid Quantization Scheme for Hardware Friendly Implementation of Embedded Deep Neural Networks.
Proceedings of the Great Lakes Symposium on VLSI 2023, 2023

Don't Cross Me! Cross-layer System Security.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

2022
FaCT-LSTM: Fast and Compact Ternary Architecture for LSTM Recurrent Neural Networks.
IEEE Des. Test, 2022

Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
Adaptive Performance Modeling of Data-intensive Workloads for Resource Provisioning in Virtualized Environment.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2021

E2BNet: MAC-free yet accurate 2-level binarized neural network accelerator for embedded systems.
J. Real Time Image Process., 2021

Security Threats in Cloud Rooted from Machine Learning-Based Resource Provisioning Systems.
Proceedings of the Silicon Valley Cybersecurity Conference - Second Conference, 2021

Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

ELC-ECG: Efficient LSTM Cell for ECG Classification Based on Quantized Architecture.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021

HosNa: A DPC++ Benchmark Suite for Heterogeneous Architectures.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021

2020
Multi-level Binarized LSTM in EEG Classification for Wearable Devices.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020

2019
TOT-Net: An Endeavor Toward Optimizing Ternary Neural Networks.
Proceedings of the 22nd Euromicro Conference on Digital System Design, 2019


  Loading...