共 50 条
- [1] Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists [J]. COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 341 - 359
- [4] Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists [J]. Proceedings - 2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design, IOLTS 2022, 2022,
- [5] Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists [J]. 2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022), 2022,
- [6] A method of hardware-trojan detection using design verification techniques [J]. Adv. Intell. Sys. Comput., (978-987):
- [7] A Method of Hardware-Trojan Detection Using Design Verification Techniques [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 978 - 987
- [9] In-situ Trojan Authentication for Invalidating Hardware-Trojan Functions [J]. PROCEEDINGS OF THE SEVENTEENTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN ISQED 2016, 2016, : 152 - 157
- [10] In-situ Trojan authentication for invalidating hardware-Trojan functions [J]. 2016, IEEE Computer Society (2016-May):