共 50 条
- [1] Design of Hardware Trojan Horse Based on Counter 2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 1007 - 1009
- [3] Design of hardware trojan horse based on counter ICQR2MSE 2011 - Proceedings of 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, 2011, : 1007 - 1009
- [4] A case study in hardware Trojan design and implementation International Journal of Information Security, 2011, 10 : 1 - 14
- [5] A New Design of Hardware Trojan Based on Path Delay INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY (ICMEIT 2018), 2018, : 419 - 423
- [6] A Hardware Trojan Detection Method Design Based on TensorFlow Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11910 LNCS : 244 - 252
- [7] Experiences in Hardware Trojan Design and Implementation 2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 50 - +
- [8] Hardware Trojan Design on Neural Networks 2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
- [9] Design of a chip destructible hardware Trojan 2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 648 - 651
- [10] (System)Verilog to Chisel Translation for Faster Hardware Design PROCEEDINGS OF THE 2020 31ST INTERNATIONAL WORKSHOP ON RAPID SYSTEM PROTOTYPING (RSP): SHORTENING THE PATH FROM SPECIFICATION TO PROTOTYPE: SHORTENING THE PATH FROM SPECIFICATION TO PROTOTYPE, 2020, : 43 - 49