共 50 条
- [31] Design of Hardware Trojan Horse Based on Counter 2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 1007 - 1009
- [32] Design of hardware trojan horse based on counter ICQR2MSE 2011 - Proceedings of 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, 2011, : 1007 - 1009
- [34] A Board-level Hardware Trojan Detection Method PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 11 - 15
- [35] A Bio-Inspired Method for Hardware Trojan Detection 2017 19TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE AND DIGITAL SYSTEMS (CADS), 2017, : 10 - 11
- [37] A New Hardware Trojan Detection Method Based on Kernel Maximum Margin Criterion Tien Tzu Hsueh Pao, 1600, 3 (656-661):
- [38] Hardware Trojan detection method based on the frequency domain characteristics of power consumption 2020 13TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2020), 2020, : 410 - 413
- [39] Hardware Trojan Detection Method for Inspecting Integrated Circuits Based on Machine Learning PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 432 - 436