no code implementations • 11 Dec 2023 • Subhajit Dutta Chowdhury, Zhiyu Ni, Qingyuan Peng, Souvik Kundu, Pierluigi Nuzzo
By iteratively applying ARGS to prune both the perturbed graph adjacency matrix and the GNN model weights, we can find adversarially robust graph lottery tickets that are highly sparse yet achieve competitive performance under different untargeted training-time structure attacks.
no code implementations • 1 Dec 2021 • Subhajit Dutta Chowdhury, Kaixin Yang, Pierluigi Nuzzo
Reverse engineering an integrated circuit netlist is a powerful tool to help detect malicious logic and counteract design piracy.