共 50 条
- [41] Towards Blockchain-enabled Mask Writing for Security against Hardware Trojan Intrusion IEEE International Conference on Electro Information Technology, 2023, 2023-May : 436 - 441
- [42] Detection of trojan HW by using hidden information on the system Proc. IEEE Int. On-Line Test. Symp., IOLTS, (192-193):
- [43] Variational Auto-Encoder Combined with Knowledge Graph Zero-Shot Learning Computer Engineering and Applications, 2023, 59 (01): : 236 - 243
- [44] TRIAL OF VISUALIZATION OF HOURLY OBSERVED DATA OF AMEDAS ANNUAL DATASET AND CLASSIFICATION WITH AUTO ENCODER AIJ Journal of Technology and Design, 2022, 28 (70): : 1296 - 1300
- [45] The Trojan horse detection technology based on support vector machine Lect. Notes Electr. Eng., 1876, VOL. 2 (197-202):
- [46] A general framework of trojan communication detection based on network traces Proc. - IEEE Int. Conf. Networking, Archit. Storage, NAS, (49-58):
- [47] Hardware Trojans: Threats, Detection, and Prevention ACM International Conference Proceeding Series, 2023, : 529 - 533
- [48] IKAROS, a solar sail demonstrator and its application to Trojan asteroid exploration 53rd AIAA/ASME/ASCE/AHS/ASC Struct. Struct. Dyn. and Mater. Conf. 2012,
- [49] Based on the network connection LAN Trojan detection system design and implementation Adv. Mater. Res., (514-518):