共 50 条
- [32] Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs IET COMPUTERS AND DIGITAL TECHNIQUES, 2018, 12 (06): : 251 - 257
- [33] Hardware Trojans classification based on controllability and observability in gate-level netlist IEICE ELECTRONICS EXPRESS, 2017, 14 (18):
- [34] Hardware Trojan Detection with Linear Regression Based Gate-Level Characterization 2014 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS), 2014, : 256 - 259
- [35] Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 341 - 359
- [36] Graph Centrality Algorithms for Hardware Trojan Detection at Gate-Level Netlists INTERNATIONAL JOURNAL OF ENGINEERING, 2022, 35 (07): : 1375 - 1387
- [37] The Improved COTD Technique for Hardware Trojan Detection in Gate-level Netlist PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 449 - 454
- [38] Gate-Level Hardware Countermeasure Comparison against Power Analysis Attacks APPLIED SCIENCES-BASEL, 2022, 12 (05):
- [40] Evolvable hardware at function level PROCEEDINGS OF 1997 IEEE INTERNATIONAL CONFERENCE ON EVOLUTIONARY COMPUTATION (ICEC '97), 1997, : 187 - 192