default search action
Fatemeh Ganji
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Mahmudul Hasan, Tamzidul Hoque, Fatemeh Ganji, Damon L. Woodard, Domenic Forte, Sumaiya Shomaji:
A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication. J. Hardw. Syst. Secur. 8(3): 160-173 (2024) - [j18]Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 574-602 (2024) - [j17]Dev M. Mehta, Mohammad Hashemi, David Selasi Koblah, Domenic Forte, Fatemeh Ganji:
Bake It Till You Make It Heat-induced Power Leakage from Masked Neural Networks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 569-609 (2024) - [c21]Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:
Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions. ACNS (3) 2024: 325-354 - [i24]Seyedmohammad Nouraniboosjin, Fatemeh Ganji:
Too Hot To Be True: Temperature Calibration for Higher Confidence in NN-assisted Side-channel Analysis. IACR Cryptol. ePrint Arch. 2024: 71 (2024) - [i23]Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. IACR Cryptol. ePrint Arch. 2024: 72 (2024) - [i22]Mohammad Hashemi, Dev M. Mehta, Kyle Mitard, Shahin Tajik, Fatemeh Ganji:
FaultyGarble: Fault Attack on Secure Multiparty Neural Network Inference. IACR Cryptol. ePrint Arch. 2024: 980 (2024) - 2023
- [j16]David Selasi Koblah, Ulbert J. Botero, Sean P. Costello, Olivia P. Dizon-Paradis, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
A Fast Object Detection-Based Framework for Via Modeling on PCB X-Ray CT Images. ACM J. Emerg. Technol. Comput. Syst. 19(4): 34:1-34:20 (2023) - [j15]Rabin Yu Acharya, Fatemeh Ganji, Domenic Forte:
Information Theory-based Evolution of Neural Networks for Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 401-437 (2023) - [j14]David Selasi Koblah, Rabin Yu Acharya, Daniel E. Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation. ACM Trans. Design Autom. Electr. Syst. 28(2): 16:1-16:57 (2023) - [i21]Rabin Yu Acharya, Laurens Le Jeune, Nele Mentens, Fatemeh Ganji, Domenic Forte:
Quantization-aware Neural Architectural Search for Intrusion Detection. CoRR abs/2311.04194 (2023) - [i20]Mohammad Hashemi, Domenic Forte, Fatemeh Ganji:
Time is money, friend! Timing Side-channel Attack against Garbled Circuit Constructions. IACR Cryptol. ePrint Arch. 2023: 1 (2023) - [i19]Dev M. Mehta, Mohammad Hashemi, David Selasi Koblah, Domenic Forte, Fatemeh Ganji:
Bake It Till You Make It: Heat-induced Leakage from Masked Neural Networks. IACR Cryptol. ePrint Arch. 2023: 76 (2023) - 2022
- [j13]Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte:
Physical security in the post-quantum era. J. Cryptogr. Eng. 12(3): 267-303 (2022) - [j12]Tahoura Mosavirik, Fatemeh Ganji, Patrick Schaumont, Shahin Tajik:
ScatterVerif: Verification of Electronic Boards Using Reflection Response of Power Distribution Network. ACM J. Emerg. Technol. Comput. Syst. 18(4): 65:1-65:24 (2022) - [c20]David Selasi Koblah, Fatemeh Ganji, Domenic Forte, Shahin Tajik:
Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities. MTD@CCS 2022: 25-36 - [c19]Mohammad Hashemi, Steffi Roy, Fatemeh Ganji, Domenic Forte:
Garbled EDA: Privacy Preserving Electronic Design Automation. ICCAD 2022: 156:1-156:9 - [c18]Mohammad Hashemi, Steffi Roy, Domenic Forte, Fatemeh Ganji:
HWGN2: Side-Channel Protected NNs Through Secure and Private Function Evaluation. SPACE 2022: 225-248 - [p2]Shahin Tajik, Fatemeh Ganji:
Artificial Neural Networks and Fault Injection Attacks. Security and Artificial Intelligence 2022: 72-84 - [p1]Fatemeh Ganji, Shahin Tajik:
Physically Unclonable Functions and AI - Two Decades of Marriage. Security and Artificial Intelligence 2022: 85-106 - [i18]David Selasi Koblah, Rabin Yu Acharya, Daniel E. Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation. CoRR abs/2204.09579 (2022) - [i17]Mohammad Hashemi, Steffi Roy, Domenic Forte, Fatemeh Ganji:
HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation. CoRR abs/2208.03806 (2022) - [i16]Mohammad Hashemi, Steffi Roy, Fatemeh Ganji, Domenic Forte:
Garbled EDA: Privacy Preserving Electronic Design Automation. CoRR abs/2208.03822 (2022) - 2021
- [j11]Soroush M. Sohi, Jean-Pierre Seifert, Fatemeh Ganji:
RNNIDS: Enhancing network intrusion detection systems through deep learning. Comput. Secur. 102: 102151 (2021) - [j10]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Mark M. Tehranipoor, Domenic Forte:
Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version). J. Cryptogr. Eng. 11(2): 105-118 (2021) - [j9]Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil A. Mallaiyan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte:
Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives. ACM J. Emerg. Technol. Comput. Syst. 17(4): 62:1-62:53 (2021) - [j8]Sumaiya Shomaji, Zimu Guo, Fatemeh Ganji, Nima Karimian, Damon L. Woodard, Domenic Forte:
BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person. J. Hardw. Syst. Secur. 5(3): 223-236 (2021) - [j7]Sumaiya Shomaji, Pallabi Ghosh, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
An Analysis of Enrollment and Query Attacks on Hierarchical Bloom Filter-Based Biometric Systems. IEEE Trans. Inf. Forensics Secur. 16: 5294-5309 (2021) - [c17]Rabin Yu Acharya, Noeloikeau F. Charlot, Md. Mahbub Alam, Fatemeh Ganji, Daniel J. Gauthier, Domenic Forte:
Chaogate Parameter Optimization using Bayesian Optimization and Genetic Algorithm. ISQED 2021: 426-431 - [c16]Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert:
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model. SP 2021: 1955-1971 - [i15]Rabin Yu Acharya, Fatemeh Ganji, Domenic Forte:
InfoNEAT: Information Theory-based NeuroEvolution of Augmenting Topologies for Side-channel Analysis. CoRR abs/2105.00117 (2021) - [i14]Ana Covic, Fatemeh Ganji, Domenic Forte:
Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners. CoRR abs/2106.12714 (2021) - 2020
- [j6]Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Recycled SoC Detection Using LDO Degradation. SN Comput. Sci. 1(6): 312 (2020) - [c15]Fatemeh Ganji, Sarah Amir, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert:
Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems. DATE 2020: 514-519 - [c14]Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm. HOST 2020: 284-294 - [c13]Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Low-Cost Remarked Counterfeit IC Detection using LDO Regulators. ISCAS 2020: 1-5 - [i13]Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil Azhagan Mallaiyan Sathiaseelan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte:
Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives. CoRR abs/2002.04210 (2020) - [i12]Kashyap Thimmaraju, Julian Fietkau, Fatemeh Ganji:
Towards an Insightful Computer Security Seminar. CoRR abs/2003.11340 (2020) - [i11]Rabin Yu Acharya, Sreeja Chowdhury, Fatemeh Ganji, Domenic Forte:
Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm. CoRR abs/2003.13904 (2020) - [i10]Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte:
Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions. CoRR abs/2005.04344 (2020) - [i9]Shahin Tajik, Fatemeh Ganji:
Artificial Neural Networks and Fault Injection Attacks. CoRR abs/2008.07072 (2020) - [i8]Fatemeh Ganji, Shahin Tajik:
Physically Unclonable Functions and AI: Two Decades of Marriage. CoRR abs/2008.11355 (2020) - [i7]Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert:
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model. CoRR abs/2009.04263 (2020)
2010 – 2019
- 2019
- [j5]Fatemeh Ganji, Domenic Forte, Jean-Pierre Seifert:
PUFmeter a Property Testing Tool for Assessing the Robustness of Physically Unclonable Functions to Machine Learning Attacks. IEEE Access 7: 122513-122521 (2019) - [c12]Sumaiya Shomaji, Fatemeh Ganji, Damon L. Woodard, Domenic Forte:
Hierarchical Bloom Filter Framework for Security, Space-efficiency, and Rapid Query Handling in Biometric Systems. BTAS 2019: 1-8 - [c11]Md. Mahbub Alam, Shahin Tajik, Fatemeh Ganji, Mark M. Tehranipoor, Domenic Forte:
RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions. FDTC 2019: 48-55 - [c10]Sreeja Chowdhury, Fatemeh Ganji, Troy Bryant, Nima Maghari, Domenic Forte:
Recycled Analog and Mixed Signal Chip Detection at Zero Cost Using LDO Degradation. ITC 2019: 1-10 - [c9]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones. PROOFS 2019: 33-48 - [i6]Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor:
Theoretical and Practical Approaches for Hardness Amplification of PUFs. IACR Cryptol. ePrint Arch. 2019: 534 (2019) - [i5]Fatemeh Ganji, Shahin Tajik, Domenic Forte, Jean-Pierre Seifert:
Blockchain-enabled Cryptographically-secure Hardware Obfuscation. IACR Cryptol. ePrint Arch. 2019: 928 (2019) - 2018
- [c8]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
A Fourier Analysis Based Attack Against Physically Unclonable Functions. Financial Cryptography 2018: 310-328 - [i4]Soroush M. Sohi, Fatemeh Ganji, Jean-Pierre Seifert:
Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems. CoRR abs/1807.03212 (2018) - 2017
- [b1]Fatemeh Ganji:
On the learnability of physically unclonable functions. Technical University of Berlin, Germany, 2017 - [j4]Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Having no mathematical model may not secure PUFs. J. Cryptogr. Eng. 7(2): 113-128 (2017) - [i3]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions. IACR Cryptol. ePrint Arch. 2017: 551 (2017) - 2016
- [j3]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
PAC learning of arbiter PUFs. J. Cryptogr. Eng. 6(3): 249-258 (2016) - [c7]Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Strong Machine Learning Attack Against PUFs with No Mathematical Model. CHES 2016: 391-411 - [i2]Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Strong Machine Learning Attack against PUFs with No Mathematical Model. IACR Cryptol. ePrint Arch. 2016: 606 (2016) - 2015
- [j2]Fatemeh Ganji, Lukasz Budzisz, Fikru Getachew Debele, Nanfang Li, Michela Meo, Marco Ricca, Yi Zhang, Adam Wolisz:
Greening campus WLANs: Energy-relevant usage and mobility patterns. Comput. Networks 78: 164-181 (2015) - [c6]Fatemeh Ganji, Juliane Krämer, Jean-Pierre Seifert, Shahin Tajik:
Lattice Basis Reduction Attack against Physically Unclonable Functions. CCS 2015: 1070-1080 - [c5]Shahin Tajik, Heiko Lohrke, Fatemeh Ganji, Jean-Pierre Seifert, Christian Boit:
Laser Fault Attack on Physically Unclonable Functions. FDTC 2015: 85-96 - [c4]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Let Me Prove It to You: RO PUFs Are Provably Learnable. ICISC 2015: 345-358 - [c3]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
Why Attackers Win: On the Learnability of XOR Arbiter PUFs. TRUST 2015: 22-39 - [i1]Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:
PAC Learning of Arbiter PUFs. IACR Cryptol. ePrint Arch. 2015: 378 (2015) - 2014
- [j1]Lukasz Budzisz, Fatemeh Ganji, Gianluca Rizzo, Marco Ajmone Marsan, Michela Meo, Yi Zhang, George Koutitas, Leandros Tassiulas, Sofie Lambert, Bart Lannoo, Mario Pickavet, Alberto Conte, Ivaylo Haratcherev, Adam Wolisz:
Dynamic Resource Provisioning for Energy Efficiency in Wireless Access Networks: A Survey and an Outlook. IEEE Commun. Surv. Tutorials 16(4): 2259-2285 (2014) - [c2]Fatemeh Ganji, Anatolij Zubow, Lukasz Budzisz, Adam Wolisz:
On detecting WLAN users communication attempts. WMNC 2014: 1-8 - 2013
- [c1]Fatemeh Ganji, Lukasz Budzisz, Adam Wolisz:
Assessment of the power saving potential in dense enterprise WLANs. PIMRC 2013: 2835-2840
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint