Rajat Subhra Chakraborty
YOU?
Author Swipe
View article: Collaborative Filtering In Recommender Systems: A Comparative Evaluation
Collaborative Filtering In Recommender Systems: A Comparative Evaluation Open
Recommender systems have become a core component of digital platforms, enabling personalized content delivery and enhancing user engagement across industries such as e-commerce, entertainment, and social networking. This study presents a c…
View article: Kol-4-Gen: Stacked Kolmogorov-Arnold and Generative Adversarial Networks for Malware Binary Classification Through Visual Analysis
Kol-4-Gen: Stacked Kolmogorov-Arnold and Generative Adversarial Networks for Malware Binary Classification Through Visual Analysis Open
View article: PUFBind: PUF-Enabled Lightweight Program Binary Authentication for FPGA-based Embedded Systems
PUFBind: PUF-Enabled Lightweight Program Binary Authentication for FPGA-based Embedded Systems Open
Field Programmable Gate Array (FPGA)-based embedded systems have become mainstream in the last decade, often in security-sensitive applications. However, even with an authenticated hardware platform, compromised software can severely jeopa…
View article: Challenges in Modelling Analog PUFs: A Study of Hybrid and Diode Triode Current Mirror Inverter PUF Under Machine Learning Attacks
Challenges in Modelling Analog PUFs: A Study of Hybrid and Diode Triode Current Mirror Inverter PUF Under Machine Learning Attacks Open
Physically unclonable function‐based authentication is one of the widely accepted and promising hardware security primitives. For security applications, strong PUF circuits can generate a large number of challenge–response pairs (CRPs) for…
View article: Evaluating Large Language Models for Automatic Register Transfer Logic Generation via High-Level Synthesis
Evaluating Large Language Models for Automatic Register Transfer Logic Generation via High-Level Synthesis Open
The ever-growing popularity of large language models (LLMs) has resulted in their increasing adoption for hardware design and verification. Prior research has attempted to assess the capability of LLMs to automate digital hardware design b…
View article: HLS-IRT: Hardware Trojan Insertion through Modification of Intermediate Representation During High-Level Synthesis
HLS-IRT: Hardware Trojan Insertion through Modification of Intermediate Representation During High-Level Synthesis Open
Modern integrated circuit (IC) design incorporates the usage of proprietary computer-aided design (CAD) software and integration of third-party hardware intellectual property (IP) cores. Subsequently, the fabrication process for the design…
View article: An image forensic technique based on JPEG ghosts
An image forensic technique based on JPEG ghosts Open
View article: Binary decision diagram‐based synthesis technique for improved mapping of Boolean functions inside memristive crossbar‐slices
Binary decision diagram‐based synthesis technique for improved mapping of Boolean functions inside memristive crossbar‐slices Open
Memristors are two‐terminal nano‐electronic devices that make it possible to design non‐volatile memory and logic circuits with high integration density. The logic operations of memristor‐based circuits are performed by applying suitable v…
View article: Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions
Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions Open
A digital communication network is typically the backbone of world wide web and web based applications. Security protocols, specifically in wireless network has undergone several rounds of modifications and upgrades in order to prevent sup…
View article: DFARPA: Differential fault attack resistant physical design automation
DFARPA: Differential fault attack resistant physical design automation Open
Differential Fault Analysis (DFA), aided by sophisticated mathematical analysis techniques for ciphers and precise fault injection methodologies, has become a potent threat to cryptographic implementations. In this paper, we propose, to th…