共 32 条
[1]
Acharya A, 2009, INT CONF PERVAS COMP, P11
[3]
Bhunia S., 2017, The Hardware Trojan War: Attacks, Myths, and Defenses, V1st, DOI DOI 10.1007/978-3-319-68511-3
[5]
Goldstein L. H., 1980, Proceedings of the 17th Design Automation Conference, P190, DOI 10.1145/800139.804528
[6]
Pre-Silicon Security Verification and Validation: A Formal Perspective
[J].
2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC),
2015,
[7]
Hamilton W.L., 2020, Synthesis Lectures on Artifical Intelligence and Machine Learning, V14, P1, DOI DOI 10.2200/S01045ED1V01Y202009AIM046
[8]
Hamilton WL, 2017, ADV NEUR IN, V30
[9]
Hasegawa K, 2022, Arxiv, DOI arXiv:2112.02213
[10]
Hasegawa K, 2017, IEEE INT SYMP CIRC S, P2154