共 60 条
- [1] Alaql A, 2019, PROCEEDINGS OF THE 2019 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST)
- [2] Alkabani YM, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P291
- [3] GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking [J]. PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 780 - 785
- [4] Azar K.Z., 2018, P IACR T CRYPT HARDW, V2019, P97, DOI 10.46586/tches.v2019.i1.97-122
- [5] NNgSAT: Neural Network guided SAT Attack on Logic Locked Complex Structures [J]. 2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), 2020,
- [6] Badier H, 2019, DES AUT TEST EUROPE, P1118, DOI [10.23919/date.2019.8715083, 10.23919/DATE.2019.8715083]
- [7] Canright D, 2005, LECT NOTES COMPUT SC, V3659, P441
- [8] Chakraborty P, 2018, PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), P56, DOI 10.1109/AsianHOST.2018.8607163
- [9] DECOY: DEflection-Driven HLS-Based Computation Partitioning for Obfuscating Intellectual PropertY [J]. PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
- [10] Collini L., 2022, PROC DESIGN AUTOM TE, P1