Furkan Aydin

College of Engineering

Works (8)

Updated: March 6th, 2026 14:02

2025 article

JugglePAC: A Pipelined Accumulation Circuit

Houraniah, A., Ugurdag, H. F., & Aydin, F. (2025, January 1). IEEE Embedded Systems Letters.

By: A. Houraniah*, H. Ugurdag* & F. Aydin n

topics (OpenAlex): Interconnection Networks and Systems
Source: NC State University Libraries
Added: March 4, 2026

2025 article

Precision Strike: Targeted Misclassification of Accelerated CNNs with a Single Clock Glitch

Malik, A. A., Aydin, F., & Aysu, A. (2025, October 14). (Vol. 10). Vol. 10.

By: A. Malik n, F. Aydin* & A. Aysu n

topics (OpenAlex): Neural Networks and Reservoir Computing; Neural Networks Stability and Synchronization; Advanced Memory and Neural Computing; Adversarial Robustness in Machine Learning; Security and Verification in Computing; Physical Unclonable Functions (PUFs) and Hardware Security
Sources: NC State University Libraries, NC State University Libraries
Added: January 9, 2026

2024 article

Extended Abstract: Pre-Silicon Vulnerability Assessment for AI/ML Hardware

Aydin, F., Karabulut, E., & Aysu, A. (2024, June 10). (Vol. 6). Vol. 6.

By: F. Aydin n, E. Karabulut n & A. Aysu n

author keywords: Pre-silicon; Side-channel analysis; pre-silicon validation; AI/ML hardware
topics (OpenAlex): Adversarial Robustness in Machine Learning; Security and Verification in Computing; Radiation Effects in Electronics
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 26, 2024

2024 article

Leaking secrets in homomorphic encryption with side-channel attacks

Aydin, F., & Aysu, A. (2024, January 12). Journal of Cryptographic Engineering.

By: F. Aydin n & A. Aysu n

author keywords: Homomorphic encryption; SEAL; Number theoretic transform; Compiler optimizations; Side-channel attacks; Machine learning
topics (OpenAlex): Cryptographic Implementations and Security; Chaos-based Image/Signal Encryption; Cryptography and Data Security
TL;DR: This article demonstrates side-channel leakages of the Microsoft SEAL HE library and proposes two attacks that can steal encryption keys during the key generation phase by abusing the leakage of ternary value assignments that occurs during the number theoretic transform (NTT) algorithm. (via Semantic Scholar)
Source: Web Of Science
Added: January 29, 2024

2024 article proceedings

Pre-Silicon Side-Channel Analysis of AI/ML Systems

By: F. Aydin n, E. Karabulut n & A. Aysu n

Event: 2024 IEEE Physical Assurance and Inspection of Electronics (PAINE)

author keywords: Pre-silicon; Side-channel analysis; Differential power analysis; Machine learning; RISC-V
topics (OpenAlex): Embedded Systems Design Techniques; Radiation Effects in Electronics
Sources: Web Of Science, Crossref
Added: February 3, 2025

2022 article

Towards AI-Enabled Hardware Security: Challenges and Opportunities

Sayadi, H., Aliasgari, M., Aydin, F., Potluri, S., Aysu, A., Edmonds, J., & Tehranipoor, S. (2022, September 12).

By: H. Sayadi*, M. Aliasgari*, F. Aydin n, S. Potluri n, A. Aysu n, J. Edmonds*, S. Tehranipoor*

topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing; Advanced Malware Detection Techniques
TL;DR: The growing role of AI/ML techniques in hardware and architecture security field is highlighted and insightful discussions on pressing challenges, opportunities, and future directions of designing accurate and efficient machine learning-based attacks and defense mechanisms in response to emerging hardware security vulnerabilities in modern computer systems and next generation of cryptosystems are provided. (via Semantic Scholar)
Source: Web Of Science
Added: October 24, 2022

2020 article

2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning

Kashyap, P., Aydin, F., Potluri, S., Franzon, P. D., & Aysu, A. (2020, November 17). IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 6, pp. 1–1.

By: P. Kashyap n, F. Aydin n, S. Potluri n, P. Franzon n & A. Aysu n

author keywords: Resistance; Performance evaluation; Deep learning; Protocols; Power measurement; Side-channel attacks; NIST; Cross-device; data-augmentation; deep learning (DL); lattice-based key-exchange protocols; power side channels
topics (OpenAlex): Cryptographic Implementations and Security; Physical Unclonable Functions (PUFs) and Hardware Security; Security and Verification in Computing
TL;DR: 2Deep—a deep-learning (DL)-based SCA—targeting parallelized implementations of PQKE protocols, namely, Frodo and NewHope with data augmentation techniques are proposed, exploring approaches that convert 1-D time-series power measurement data into 2-D images to formulate SCA an image recognition task. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: June 10, 2021

2020 article

Machine learning and hardware security

Regazzoni, F., Bhasin, S., Pour, A. A., Alshaer, I., Aydin, F., Aysu, A., … Yli-Mäyry, V. (2020, November 2). 2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), Vol. 11.

author keywords: machine learning; hardware security
topics (OpenAlex): Physical Unclonable Functions (PUFs) and Hardware Security; Advanced Malware Detection Techniques; Adversarial Robustness in Machine Learning
TL;DR: Novel applications of machine learning for hardware security, such as evaluation of post quantum cryptography hardware and extraction of physically unclonable functions from neural networks and practical model extraction attack based on electromagnetic side-channel measurements are demonstrated. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 30, 2021

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2026) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.