共 50 条
- [1] In-situ Trojan Authentication for Invalidating Hardware-Trojan Functions PROCEEDINGS OF THE SEVENTEENTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN ISQED 2016, 2016, : 152 - 157
- [3] A Hardware-Trojan Classification Method Utilizing Boundary Net Structures 2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
- [4] A method of hardware-trojan detection using design verification techniques Adv. Intell. Sys. Comput., (978-987):
- [5] A Method of Hardware-Trojan Detection Using Design Verification Techniques COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 978 - 987
- [6] Evaluation of the Robustness against Adversarial Examples in Hardware-Trojan Detection Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics, 2021, 2021-November : 5 - 8
- [8] Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 341 - 359