Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Engineering
Trojan Detection Expansion Of Structural Checking, Zachary Chapman
Trojan Detection Expansion Of Structural Checking, Zachary Chapman
Graduate Theses and Dissertations
With the growth of the integrated circuit (IC) market, there has also been a rise in demand for third-party soft intellectual properties (IPs). However, the growing use of such Ips makes it easier for adversaries to hide malicious code, like hardware Trojans, into these designs. Unlike software Trojan detection, hardware Trojan detection is still an active research area. One proposed approach to this problem is the Structural Checking tool, which can detect hardware Trojans using two methodologies. The first method is a matching process, which takes an unknown design and attempts to determine if it might contain a Trojan by …
Deep Learning Frameworks For Accelerated Magnetic Resonance Image Reconstruction Without Ground Truths, Ibsa Kumara Jalata
Deep Learning Frameworks For Accelerated Magnetic Resonance Image Reconstruction Without Ground Truths, Ibsa Kumara Jalata
Graduate Theses and Dissertations
Magnetic Resonance Imaging (MRI) is typically a slow process because of its sequential data acquisition. To speed up this process, MR acquisition is often accelerated by undersampling k-space signals and solving an ill-posed problem through a constrained optimization process. Image reconstruction from under-sampled data is posed as an inverse problem in traditional model-based learning paradigms. While traditional methods use image priors as constraints, modern deep learning methods use supervised learning with ground truth images to learn image features and priors. However, in some cases, ground truth images are not available, making supervised learning impractical. Recent data-centric learning frameworks such as …