Setareh Rafatirad

Orcid: 0000-0003-2035-8512

Affiliations:
  • George Mason University


According to our database1, Setareh Rafatirad authored at least 110 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Hardware Trojan Detection Using Machine Learning: A Tutorial.
ACM Trans. Embed. Comput. Syst., 2023

Adversarial Attacks Against Machine Learning-Based Resource Provisioning Systems.
IEEE Micro, 2023

HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion.
CoRR, 2023

Advanced Reinforcement Learning Solution for Clock Skew Engineering: Modified Q-Table Update Technique for Peak Current and IR Drop Minimization.
IEEE Access, 2023

HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Automated Supervised Topic Modeling Framework for Hardware Weaknesses.
Proceedings of the 24th International Symposium on Quality Electronic Design, 2023

Unleashing the Potential of Reinforcement Learning for Enhanced Personalized Education.
Proceedings of the IEEE Frontiers in Education Conference, 2023

Towards Race and Gender Equity in Data Science Education.
Proceedings of the IEEE Frontiers in Education Conference, 2023

Federated Learning with Heterogeneous Models for On-device Malware Detection in IoT Networks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

Emotion and Stress Recognition Utilizing Galvanic Skin Response and Wearable Technology: A Real-time Approach for Mental Health Care.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

Introducing an Open-Source Python Toolkit for Machine Learning Research in Physiological Signal based Affective Computing.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
Breaking the Design and Security Trade-off of Look-up-table-based Obfuscation.
ACM Trans. Design Autom. Electr. Syst., 2022

A Neural Network-Based Cognitive Obfuscation Toward Enhanced Logic Locking.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Imitating Functional Operations for Mitigating Side-Channel Leakage.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

A Neural Network-based SAT-Resilient Obfuscation Towards Enhanced Logic Locking.
CoRR, 2022

Neuromorphic-Enabled Security for IoT.
Proceedings of the 20th IEEE Interregional NEWCAS Conference, 2022

Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Accelerated Machine Learning for On-Device Hardware-Assisted Cybersecurity in Edge Platforms.
Proceedings of the 23rd International Symposium on Quality Electronic Design, 2022

Iron-Dome: Securing IoT Networked Systems at Runtime by Network and Device Characteristics to Confine Malware Epidemics.
Proceedings of the IEEE 40th International Conference on Computer Design, 2022

Breakthrough to Adaptive and Cost-Aware Hardware-Assisted Zero-Day Malware Detection: A Reinforcement Learning-Based Approach.
Proceedings of the IEEE 40th International Conference on Computer Design, 2022

RAFeL - Robust and Data-Aware Federated Learning-inspired Malware Detection in Internet-of-Things (IoT) Networks.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

Survey of Machine Learning for Electronic Design Automation.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

Convolution Neural Network for Pain Intensity Assessment from Facial Expression.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022

ATLAS: An Adaptive Transfer Learning Based Pain Assessment System: A Real Life Unsupervised Pain Assessment Solution.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022

Machine Learning to the Rescue: ML-Assisted Framework for Equity-Driven Education.
Proceedings of the IEEE Global Engineering Education Conference, 2022

CR-Spectre: Defense-Aware ROP Injected Code-Reuse Based Dynamic Spectre.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

LOCK&ROLL: deep-learning power side-channel attack mitigation using emerging reconfigurable devices and logic locking.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

Silicon validation of LUT-based logic-locked IP cores.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

A Low Cost EDA-based Stress Detection Using Machine Learning.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

Prevent Over-fitting and Redundancy in Physiological Signal Analyses for Stress Detection.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

Towards Generalized ML Model in Automated Physiological Arousal Computing: A Transfer Learning-Based Domain Generalization Approach.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

2021
Adaptive Performance Modeling of Data-intensive Workloads for Resource Provisioning in Virtualized Environment.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2021

Deep Graph Learning for Circuit Deobfuscation.
Frontiers Big Data, 2021

Enabling Micro AI for Securing Edge Devices at Hardware Level.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2021

Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach.
Cryptogr., 2021

Power Swapper: Approximate Functional Block Assisted Cryptosystem Security.
Proceedings of the 34th IEEE International System-on-Chip Conference, 2021

Ontology-Driven Framework for Trend Analysis of Vulnerabilities and Impacts in IoT Hardware.
Proceedings of the 15th IEEE International Conference on Semantic Computing, 2021

Cloak & Co-locate: Adversarial Railroading of Resource Sharing-based Attacks on the Cloud.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

Machine Learning-Assisted Website Fingerprinting Attacks with Side-Channel Information: A Comprehensive Analysis and Characterization.
Proceedings of the 22nd International Symposium on Quality Electronic Design, 2021

HosNa: A DPC++ Benchmark Suite for Heterogeneous Architectures.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021

Performance-aware Malware Epidemic Confinement in Large-Scale IoT Networks.
Proceedings of the ICC 2021, 2021

Energy-Efficient and Adversarially Robust Machine Learning with Selective Dynamic Band Filtering.
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021

A Cognitive SAT to SAT-Hard Clause Translation-based Logic Obfuscation.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

HMD-Hardener: Adversarially Robust and Efficient Hardware-Assisted Runtime Malware Detection.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

On-device Malware Detection using Performance-Aware and Robust Collaborative Learning.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

Securing Hardware via Dynamic Obfuscation Utilizing Reconfigurable Interconnect and Logic Blocks.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

Evaluation of Machine Learning-based Detection against Side-Channel Attacks on Autonomous Vehicle.
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence Circuits and Systems, 2021

Demography-aware COVID-19 Confinement with Game Theory.
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence Circuits and Systems, 2021

2020
Cognitive and Scalable Technique for Securing IoT Networks Against Malware Epidemics.
IEEE Access, 2020

Semantic Convolutional Neural Network model for Safe Business Investment by Using BERT.
Proceedings of the Seventh International Conference on Social Networks Analysis, 2020

Using Transfer Learning Approach to Implement Convolutional Neural Network model to Recommend Airline Tickets by Using Online Reviews.
Proceedings of the 15th International Workshop on Semantic and Social Media Adaptation and Personalization, 2020

Recent Advancements in Microarchitectural Security: Review of Machine Learning Countermeasures.
Proceedings of the 63rd IEEE International Midwest Symposium on Circuits and Systems, 2020

Bidirectional Transformer based on online Text-based information to Implement Convolutional Neural Network Model For Secure Business Investment.
Proceedings of the IEEE International Symposium on Technology and Society, 2020

SATConda: SAT to SAT-Hard Clause Translator.
Proceedings of the 21st International Symposium on Quality Electronic Design, 2020

Entropy-Shield: Side-Channel Entropy Maximization for Timing-based Side-Channel Attacks.
Proceedings of the 21st International Symposium on Quality Electronic Design, 2020

SCARF: Detecting Side-Channel Attacks at Real-time using Low-level Hardware Features.
Proceedings of the 26th IEEE International Symposium on On-Line Testing and Robust System Design, 2020

HybriDG: Hybrid Dynamic Time Warping and Gaussian Distribution Model for Detecting Emerging Zero-Day Microarchitectural Side-Channel Attacks.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Phased-Guard: Multi-Phase Machine Learning Framework for Detection and Identification of Zero-Day Microarchitectural Side-Channel Attacks.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

Hybrid-Shield: Accurate and Efficient Cross-Layer Countermeasure for Run-Time Detection and Mitigation of Cache-Based Side-Channel Attacks.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2020

Comprehensive Evaluation of Machine Learning Countermeasures for Detecting Microarchitectural Side-Channel Attacks.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

StealthMiner: Specialized Time Series Machine Learning for Run-Time Stealthy Malware Detection based on Microarchitectural Features.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

Mitigating Cache-Based Side-Channel Attacks through Randomization: A Comprehensive System and Architecture Level Analysis.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

Estimating the Circuit De-obfuscation Runtime based on Graph Deep Learning.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
Big vs little core for energy-efficient Hadoop computing.
J. Parallel Distributed Comput., 2019

Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design.
CoRR, 2019

Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning.
CoRR, 2019

Stealthy Malware Detection using RNN-Based Automated Localized Feature Extraction and Classifier.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

ECoST: Energy-Efficient Co-Locating and Self-Tuning MapReduce Applications.
Proceedings of the 48th International Conference on Parallel Processing, 2019

A+ Tuning: Architecture+Application Auto-Tuning for In-Memory Data-Processing Frameworks.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

RNN-Based Classifier to Detect Stealthy Malware using Localized Features and Complex Symbolic Sequence.
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019

Deep Multi-attributed Graph Translation with Node-Edge Co-Evolution.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

Security and Complexity Analysis of LUT-based Obfuscation: From Blueprint to Reality.
Proceedings of the International Conference on Computer-Aided Design, 2019

Mitigating the Performance and Quality of Parallelized Compressive Sensing Reconstruction Using Image Stitching.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

On Custom LUT-based Obfuscation.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

Pyramid: Machine Learning Framework to Estimate the Optimal Timing and Resource Usage of a High-Level Synthesis Design.
Proceedings of the 29th International Conference on Field Programmable Logic and Applications, 2019

2SMaRT: A Two-Stage Machine Learning-Based Approach for Run-Time Specialized Hardware-Assisted Malware Detection.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

Adversarial Attack on Microarchitectural Events based Malware Detectors.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

MicroArchitectural Events and Image Processing-based Hybrid Approach for Robust Malware Detection.
Proceedings of the 2019 International Conference on Compliers, 2019

SAT to SAT-Hard Clause Translator.
Proceedings of the 2019 International Conference on Compliers, 2019

Sequence-Crafter: Side-Channel Entropy Minimization to Thwart Timing-based Side-Channel Attacks.
Proceedings of the 2019 International Conference on Compliers, 2019

XPPE: cross-platform performance estimation of hardware accelerators using machine learning.
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019

2018
System and Architecture Level Characterization of Big Data Applications on Big and Little Core Server Architectures.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2018

Programmable Gates Using Hybrid CMOS-STT Design to Prevent IC Reverse Engineering.
ACM Trans. Design Autom. Electr. Syst., 2018

Optimal Allocation of Computation and Communication in an IoT Network.
ACM Trans. Design Autom. Electr. Syst., 2018

Hardware Accelerated Mappers for Hadoop MapReduce Streaming.
IEEE Trans. Multi Scale Comput. Syst., 2018

Hadoop Workloads Characterization for Performance and Energy Efficiency Optimizations on Microservers.
IEEE Trans. Multi Scale Comput. Syst., 2018

Energy-efficient acceleration of MapReduce applications using FPGAs.
J. Parallel Distributed Comput., 2018

Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Architectural considerations for FPGA acceleration of machine learning applications in MapReduce.
Proceedings of the 18th International Conference on Embedded Computer Systems: Architectures, 2018

A comprehensive memory analysis of data intensive workloads on server class architecture.
Proceedings of the International Symposium on Memory Systems, 2018

Efficient utilization of adversarial training towards robust machine learners and its analysis.
Proceedings of the International Conference on Computer-Aided Design, 2018

Design Space Exploration for Hardware Acceleration of Machine Learning Applications in MapReduce.
Proceedings of the 26th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2018

Ensemble learning for effective run-time hardware-based malware detection: a comprehensive analysis and classification.
Proceedings of the 55th Annual Design Automation Conference, 2018

Energy-aware and Machine Learning-based Resource Provisioning of In-Memory Analytics on Cloud.
Proceedings of the ACM Symposium on Cloud Computing, 2018

Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

Main-Memory Requirements of Big Data Applications on Commodity Server Platform.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

Advances and throwbacks in hardware-assisted security: special session.
Proceedings of the International Conference on Compilers, 2018

Compressive Sensing on Storage Data: An Effective Solution to Alleviate I/0 Bottleneck in Data- Intensive Workloads.
Proceedings of the 29th IEEE International Conference on Application-specific Systems, 2018

2017
Understanding the role of memory subsystem on performance and energy-efficiency of Hadoop applications.
Proceedings of the Eighth International Green and Sustainable Computing Conference, 2017

2016
Characterizing Hadoop applications on microservers for performance and energy efficiency optimizations.
Proceedings of the 2016 IEEE International Symposium on Performance Analysis of Systems and Software, 2016

Big biomedical image processing hardware acceleration: A case study for K-means and image filtering.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

2015
System and architecture level characterization of big data applications on big and little core server architectures.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2013
Transforming Personal Artifacts into Probabilistic Narratives.
Proceedings of the 2013 UAI Application Workshops: Big Data meet Complex Models and Models for Spatial, 2013

Context Correlation Using Probabilistic Semantics.
Proceedings of the Eighth Conference on Semantic Technologies for Intelligence, 2013

Context-Based Event Ontology Extension in Multimedia Applications.
Proceedings of the 2013 IEEE Seventh International Conference on Semantic Computing, 2013

2011
A comprehensive study of visual event computing.
Multim. Tools Appl., 2011

Contextual Augmentation of Ontology for Recognizing Sub-events.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

2009
MEDIALIFE: from images to a life chronicle.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009

Event composition operators: ECO.
Proceedings of the 1st ACM international workshop on Events in multimedia, 2009


  Loading...