{"id":"https://openalex.org/W3213631809","doi":"https://doi.org/10.1109/jetcas.2021.3126816","title":"Enabling Micro AI for Securing Edge Devices at Hardware Level","display_name":"Enabling Micro AI for Securing Edge Devices at Hardware Level","publication_year":2021,"publication_date":"2021-11-09","ids":{"openalex":"https://openalex.org/W3213631809","doi":"https://doi.org/10.1109/jetcas.2021.3126816","mag":"3213631809"},"language":"en","primary_location":{"id":"doi:10.1109/jetcas.2021.3126816","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jetcas.2021.3126816","pdf_url":null,"source":{"id":"https://openalex.org/S142323794","display_name":"IEEE Journal on Emerging and Selected Topics in Circuits and Systems","issn_l":"2156-3357","issn":["2156-3357","2156-3365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Emerging and Selected Topics in Circuits and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050404392","display_name":"Han Wang","orcid":"https://orcid.org/0000-0002-0254-9246"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Han Wang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of California at Davis, Davis, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of California at Davis, Davis, CA, USA","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080844858","display_name":"Hossein Sayadi","orcid":"https://orcid.org/0000-0001-6423-0145"},"institutions":[{"id":"https://openalex.org/I59897056","display_name":"California State University, Long Beach","ror":"https://ror.org/0080fxk18","country_code":"US","type":"education","lineage":["https://openalex.org/I59897056"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hossein Sayadi","raw_affiliation_strings":["Department of Computer Engineering and Computer Science, California State University at Long Beach, Long Beach, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering and Computer Science, California State University at Long Beach, Long Beach, CA, USA","institution_ids":["https://openalex.org/I59897056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047725314","display_name":"Sai Manoj Pudukotai Dinakarrao","orcid":"https://orcid.org/0000-0002-4417-2387"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sai Manoj Pudukotai Dinakarrao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060036961","display_name":"Avesta Sasan","orcid":"https://orcid.org/0000-0002-4052-8075"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Avesta Sasan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of California at Davis, Davis, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of California at Davis, Davis, CA, USA","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103033046","display_name":"Setareh Rafatirad","orcid":"https://orcid.org/0000-0003-2035-8512"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Setareh Rafatirad","raw_affiliation_strings":["Department of Computer Science, University of California at Davis, Davis, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California at Davis, Davis, CA, USA","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047382437","display_name":"Houman Homayoun","orcid":"https://orcid.org/0000-0001-8904-4699"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Houman Homayoun","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of California at Davis, Davis, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of California at Davis, Davis, CA, USA","institution_ids":["https://openalex.org/I84218800"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5050404392"],"corresponding_institution_ids":["https://openalex.org/I84218800"],"apc_list":null,"apc_paid":null,"fwci":1.8519,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.86396149,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"11","issue":"4","first_page":"803","last_page":"815"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8085154294967651},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.758849024772644},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5929034948348999},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5507694482803345},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5167909860610962},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.48390159010887146},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4653205871582031},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4358604848384857},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3223468065261841},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.26966091990470886},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.260817289352417},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2550949454307556},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.24124738574028015},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1798625886440277}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8085154294967651},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.758849024772644},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5929034948348999},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5507694482803345},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5167909860610962},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.48390159010887146},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4653205871582031},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4358604848384857},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3223468065261841},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.26966091990470886},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.260817289352417},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2550949454307556},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.24124738574028015},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1798625886440277},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jetcas.2021.3126816","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jetcas.2021.3126816","pdf_url":null,"source":{"id":"https://openalex.org/S142323794","display_name":"IEEE Journal on Emerging and Selected Topics in Circuits and Systems","issn_l":"2156-3357","issn":["2156-3357","2156-3365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Emerging and Selected Topics in Circuits and Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W83535271","https://openalex.org/W1427174644","https://openalex.org/W1503814339","https://openalex.org/W1934458198","https://openalex.org/W1963952886","https://openalex.org/W2001759130","https://openalex.org/W2034053858","https://openalex.org/W2060692877","https://openalex.org/W2092991224","https://openalex.org/W2138471478","https://openalex.org/W2203388234","https://openalex.org/W2292977173","https://openalex.org/W2337480911","https://openalex.org/W2507765405","https://openalex.org/W2508317201","https://openalex.org/W2522718524","https://openalex.org/W2599823825","https://openalex.org/W2602229646","https://openalex.org/W2625408821","https://openalex.org/W2725461839","https://openalex.org/W2734812495","https://openalex.org/W2742100187","https://openalex.org/W2792326895","https://openalex.org/W2797889914","https://openalex.org/W2803900647","https://openalex.org/W2945027786","https://openalex.org/W2950774332","https://openalex.org/W2963265635","https://openalex.org/W2963311060","https://openalex.org/W3004000725","https://openalex.org/W3006420424","https://openalex.org/W3007346474","https://openalex.org/W3016526453","https://openalex.org/W3045670632","https://openalex.org/W3049071473","https://openalex.org/W3093552810","https://openalex.org/W3111712354","https://openalex.org/W3130686357","https://openalex.org/W4232751114","https://openalex.org/W4245409806","https://openalex.org/W4256383029","https://openalex.org/W6628261430","https://openalex.org/W6739901113"],"related_works":["https://openalex.org/W4303857474","https://openalex.org/W3096095227","https://openalex.org/W4361770927","https://openalex.org/W4310077675","https://openalex.org/W3105069356","https://openalex.org/W2367098146","https://openalex.org/W3089192431","https://openalex.org/W2900070427","https://openalex.org/W4316042033","https://openalex.org/W3213631809"],"abstract_inverted_index":{"Emerging":[0],"embedded":[1,72],"systems":[2,73],"and":[3,29,43,46,74,80,92,108,171,176,183,195,214,219,226],"Internet-of-Things":[4],"(IoT)":[5],"devices,":[6],"which":[7,67],"account":[8],"for":[9,27,71,98,148,169,211,239],"a":[10,126,236],"wide":[11],"range":[12],"of":[13,59,155,187],"applications":[14],"are":[15,20,167,181],"often":[16],"highly":[17],"resource-constrained":[18],"that":[19,130,201],"challenging":[21],"the":[22,41,48,55,60,113,143,153,202,206],"software-based":[23,49],"methods":[24,51],"traditionally":[25],"adopted":[26],"detecting":[28],"containing":[30],"cyber-attacks":[31],"(e.g.,":[32],"malware)":[33],"in":[34,136,185,247],"general-purpose":[35],"computing":[36,79],"systems.":[37],"In":[38],"addition":[39],"to":[40,231],"complexity":[42],"cost":[44],"(computing":[45],"storage),":[47],"detection":[50,151,188,208,216],"mainly":[52],"rely":[53],"on":[54,132],"static":[56],"signature":[57],"analysis":[58],"running":[61],"programs,":[62],"requiring":[63],"continuous":[64],"software":[65],"update":[66],"is":[68],"not":[69],"affordable":[70],"edge":[75,101,138,248],"devices":[76,102],"with":[77,152,217,222],"limited":[78,133],"communication":[81],"bandwidth.":[82],"To":[83,124],"address":[84],"these":[85],"challenges,":[86],"this":[87],"work":[88],"proposes":[89],"an":[90,156,241],"accurate":[91,149,172],"cost-efficient":[93],"micro":[94,244],"AI":[95,245],"enabled":[96],"countermeasure":[97,246],"securing":[99],"modern":[100,137],"against":[103],"emerging":[104],"cyber-attacks,":[105],"i.e.,":[106],"malware":[107,175,213],"Side-Channel":[109],"Attacks":[110],"(SCAs)":[111],"at":[112],"hardware":[114,196],"level":[115],"by":[116],"monitoring":[117],"applications\u2019":[118],"Hardware":[119],"Performance":[120],"Counter":[121],"(HPC)":[122],"features.":[123],"realize":[125],"run-time":[127,173],"ML-based":[128],"solution":[129],"relies":[131],"available":[134],"HPCs":[135],"processors,":[139],"we":[140],"first":[141],"identify":[142],"most":[144],"prominent":[145],"HPC":[146],"events":[147],"attack":[150],"aid":[154],"effective":[157,170],"feature":[158],"selection":[159],"method.":[160],"Next,":[161],"various":[162],"standard":[163],"machine":[164],"learning":[165],"classifiers":[166],"implemented":[168],"hardware-assisted":[174,243],"side-channel":[177],"attacks":[178],"detection.":[179],"They":[180],"compared":[182,230],"characterized":[184],"terms":[186],"accuracy,":[189],"F-measure,":[190],"robustness,":[191],"latency,":[192],"power":[193],"consumption,":[194],"overheads.":[197],"Experimental":[198],"results":[199],"demonstrate":[200],"J48":[203],"classifier":[204],"achieves":[205],"highest":[207],"rate":[209],"(F-measure)":[210],"both":[212],"SCAs":[215],"0.917":[218],"0.987,":[220],"respectively,":[221],"relatively":[223],"negligible":[224],"latency":[225],"area":[227],"overhead":[228],"as":[229],"complex":[232],"models":[233],"making":[234],"it":[235],"suitable":[237],"algorithm":[238],"enabling":[240],"efficient":[242],"devices.":[249]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
