共 50 条
- [32] Resilient Hardware Trojans Detection based on Path Delay Measurements 2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 151 - 156
- [33] A Feature Extraction Method for Hardware Trojans Detection PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 1726 - 1731
- [34] SWAN: Mitigating Hardware Trojans with Design Ambiguity 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
- [36] Designing Hardware Trojans and Their Detection based on a SVM-based Approach 2017 IEEE 12TH INTERNATIONAL CONFERENCE ON ASIC (ASICON), 2017, : 811 - 814
- [37] Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based Detection 2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 101 - 106
- [38] Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based Detection Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, 2024, : 101 - 106
- [39] Securing AI Hardware: Challenges in Detecting and Mitigating Hardware Trojans in ML Accelerators Midwest Symposium on Circuits and Systems, 2023, : 821 - 825
- [40] Identify Hardware Trojans Based on Delay Feature Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2022, 34 (04): : 515 - 521