共 35 条
- [21] Binary Jamming Message Solutions for Source-Wiretapping Under Physical-Layer Security: Analysis and Design Wireless Pers Commun, 4 (2493-2512):
- [23] Detection Methods of Hardware Trojans Based on DBN and QPSO-OCSVM Anomalous Behavior Analysis Int. Conf. Electron. Commun., Netw. Comput. Technol., ECNCT, (250-255): : 250 - 255
- [24] Analysis of the core team role in open source communities Proc. Int. Conf. Complex, Intelligent Softw. Intensive Syst., CISIS, (109-114):
- [25] Particle Swarm Optimization-Driven DSE-Based Low-Cost Hardware Security for Securing DSP IP Cores EAI/Springer Innovations in Communication and Computing, 2022, : 29 - 54
- [26] Modeling and analysis of all-digital full-hardware quadrature phase-locked loop Diangong Jishu Xuebao/Transactions of China Electrotechnical Society, 2015, 30 (15): : 148 - 155
- [27] A Dynamic Window Size-Based VLSI Architecture Design of Moving Average Filter and Its Vulnerability to Hardware Trojans 2024 28th International Symposium on VLSI Design and Test, VDAT 2024, 2024,
- [28] Solutions for reverse engineering 4GL applications, recovering the design of a logistical wholesale system Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, 2011, : 343 - 346
- [29] Citation analysis of Engineering Design reports for information literacy assessment ASEE Annu. Conf. Expos. Conf. Proc., 2010,
- [30] Implementation and performance analysis of advanced IT services based on open source JAIN SLEE Proceedings - Conference on Local Computer Networks, LCN, 2011, : 746 - 753