共 50 条
- [41] Design of Hardware Trojan Horse Based on Counter 2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 1007 - 1009
- [43] Hardware Trojan Detection Based on Image Comparison Lecture Notes on Data Engineering and Communications Technologies, 2022, 80 : 979 - 986
- [44] Hardware Trojan Detection Based on Logical Testing JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
- [45] Hardware Trojan Detection Based on the Distance Discrimination 2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 404 - 407
- [46] Design of hardware trojan horse based on counter ICQR2MSE 2011 - Proceedings of 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, 2011, : 1007 - 1009
- [47] Hardware Trojan Detection Based on Signal Correlation 2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 80 - 85
- [48] Hardware Trojan Detection Based on Logical Testing Journal of Electronic Testing, 2017, 33 : 381 - 395
- [49] Hardware Trojans: The Defense and Attack of Integrated Circuits 2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 293 - 296
- [50] Hardware Trojans: The defense and attack of integrated circuits Proc IEEE Int Conf Comput Des VLSI Comput Process, 2011, (293-296):