共 50 条
- [21] Deep Learning Based Approach for Hardware Trojan Detection [J]. Proceedings - 2021 IEEE International Symposium on Smart Electronic Systems, iSES 2021, 2021, : 177 - 182
- [22] Deep Learning Based Approach for Hardware Trojan Detection [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2021), 2021, : 177 - 182
- [23] SEC: A simple and effective netlist clustering [J]. ISCAS '97 - PROCEEDINGS OF 1997 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I - IV: CIRCUITS AND SYSTEMS IN THE INFORMATION AGE, 1997, : 1688 - 1691
- [25] Hardware Trojan Horses [J]. TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 167 - 187
- [26] Hardware Trojan Detection [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
- [27] SRAM Hardware Trojan [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 719 - 722
- [29] An Evolutionary Approach to Hardware Encryption and Trojan-Horse Mitigation [J]. PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 1593 - 1598
- [30] Detection of Hardware Trojan Horse using Unsupervised Learning Approach [J]. 2023 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2023, 2023, : 77 - 82