共 50 条
- [22] Hardware ip protection during evaluation using embedded sequential trojan IEEE Des Test Comput, 3 (70-79):
- [23] Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists Proceedings - 2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design, IOLTS 2022, 2022,
- [24] Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans Proceedings of the 2022 Design, Automation and Test in Europe Conference and Exhibition, DATE 2022, 2022, : 682 - 687
- [25] The design and implementation of the Trojan Horse based on kernel hacking Appl. Mech. Mater., 1660, (2891-2894):
- [26] A Community Detection Method Based on Local Optimization in Social Networks IEEE NETWORK, 2020, 34 (04): : 42 - 48
- [27] Image saliency detection based on contrast features and local sharpness Yingyong Kexue Xuebao/Journal of Applied Sciences, 2010, 28 (01): : 24 - 31
- [28] Implicit-flow-sensitive method for detection of trojan-spy programs Ruan Jian Xue Bao/Journal of Software, 2010, 21 (06): : 1426 - 1437