共 50 条
- [1] A stealthy Hardware Trojan design and corresponding detection method [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
- [2] A Hardware Trojan Detection Method Design Based on TensorFlow [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11910 LNCS : 244 - 252
- [4] A method of hardware-trojan detection using design verification techniques [J]. Adv. Intell. Sys. Comput., (978-987):
- [5] A Method of Hardware-Trojan Detection Using Design Verification Techniques [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 978 - 987
- [6] A New Testing Method for Hardware Trojan Detection [J]. CONFERENCE ON ELECTRONICS, TELECOMMUNICATIONS AND COMPUTERS - CETC 2013, 2014, 17 : 713 - 719
- [7] Proposing a Novel Method for Hardware Trojan Detection [J]. JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2019, 78 (07): : 415 - 418
- [8] Hardware Trojan Detection [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
- [10] Hardware Trojan Design and Detection in Asynchronous NCL Circuits [J]. 2020 27TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2020,