共 50 条
- [22] Hardware Trojan Detection Based on the Distance Discrimination [J]. 2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 404 - 407
- [23] Novel design of Hardware Trojan: A generic approach for defeating testability based detection [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 162 - 173
- [24] Hardware Trojan Design and Detection in Asynchronous NCL Circuits [J]. 2020 27TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2020,
- [25] Design of Hardware Trojan Horse Based on Counter [J]. 2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 1007 - 1009
- [26] Hardware Trojan Detection Based on Image Comparison [J]. Lecture Notes on Data Engineering and Communications Technologies, 2022, 80 : 979 - 986
- [27] Hardware Trojan Detection Based on Logical Testing [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
- [28] Design of hardware trojan horse based on counter [J]. ICQR2MSE 2011 - Proceedings of 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, 2011, : 1007 - 1009
- [29] Hardware Trojan Detection Based on Signal Correlation [J]. 2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 80 - 85
- [30] Hardware Trojan Detection Based on Logical Testing [J]. Journal of Electronic Testing, 2017, 33 : 381 - 395