Results 51 to 60 of about 9,568 (196)

Cybersecurity Driven Quantum Digital Twin for Proactive Threat Reversal in Open RAN

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
This paper presents a novel cybersecurity‐driven quantum digital twin (CQDT) architecture for proactive defence in 6G Open RAN. By integrating quantum observables and reinforcement learning, the framework maintains high fidelity and suppresses entropy under adversarial CPTP noise. CQDT achieves real‐time adaptation with sub‐20 ms latency, meeting URLLC
Yassir Al‐Karawi   +2 more
wiley   +1 more source

Hardware Trojan detection method based upon XGBoost model

open access: yesDianzi Jishu Yingyong, 2019
This paper proposed a hardware Trojan detection method based upon XGBoost(eXtreme Gradient Boosting) model by using the analysis results of ring oscillator network, and used the cross-validation method to optimize the model.
Gao Hongbo   +3 more
doaj   +1 more source

A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Due to technical barriers and economic costs, malicious circuits, known as hardware Trojans, are easily implanted in the complicated integrated circuit design and manufacturing process, which can lead to many disastrous consequences, such as denial of ...
Dong Cheng   +5 more
doaj   +1 more source

Hardware Trojan Detection Using Graph Neural Networks

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design, fabrication, and testing process from a single trusted entity to various untrusted third-party entities around the world. The risk of using untrusted third-Party Intellectual Property (3PIP) is the possibility for adversaries to insert malicious modifications ...
Rozhin Yasaei   +3 more
openaire   +2 more sources

Resisting Quantum Key Distribution Attacks Using Quantum Machine Learning

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Quantum key distribution (QKD) promises secure communication but remains vulnerable to advanced quantum attacks. We propose a hybrid quantum long short‐term memory (QLSTM) model that combines quantum‐enhanced learning with classical deep learning to detect attacks such as photon‐number splitting, Trojan‐Horse and detector blinding.
Ali Al‐Kuwari   +4 more
wiley   +1 more source

IP Soft Core Hardware Trojan Detection Method Based on Grayscale Graph Analysis [PDF]

open access: yesJisuanji gongcheng
With the refinement of the division of labor in chip design, manufacturing, and packaging processes, the use of third-party Intellectual Property(IP) soft cores for secondary development can significantly improve design efficiency and reduce duplication ...
Lin NI, Zihui LIU, Shuai ZHANG, Jiujiang HAN, Ming XIAN
doaj   +1 more source

Quantum Key Distribution Networks Design: Overview and Challenges

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
This paper explores the potential of using established QKD network design techniques in the context of quantum key distribution, which is based on the principles of quantum mechanics. ABSTRACT Quantum cryptography has increasingly attracted interest from both industry and academia for its potential in real‐world applications.
Pankaj Kumar   +2 more
wiley   +1 more source

Extraction of intrinsic structure for Hardware Trojan detection [PDF]

open access: yes, 2015
Cryptology ePrint Archive: Report 2015/912In this paper we present a novel solution to address the problem of potential malicious circuitry on FPGA. This method is based on an a technique of structure extraction which consider the infection of an all lot.
Fournier, Jacques Jean-Alain   +2 more
core   +1 more source

A Survey of Techniques for Improving Security of GPUs

open access: yes, 2018
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest `link' in the security `chain'.
Abhinaya, S. B.   +3 more
core   +1 more source

Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy