共 53 条
- [1] Abdi H., 2007, ENCY MEASUREMENT STA, V2, P508, DOI DOI 10.4135/9781412952644.N239
- [2] AdamWaksman Matthew Suozzo, 2013, P 2013 ACM SIGSAC C, P697
- [3] [Anonymous], 2017, P IEEE INT S CIRC SY
- [4] Batista G. E., 2003, 2 BRAZ WORKSH BIOINF, V3, P10
- [5] Hardware Trojan Attacks: Threat Analysis and Countermeasures [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247
- [7] Hardware Trojan: Threats and Emerging Solutions [J]. 2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP, 2009, : 166 - 171
- [8] XGBoost: A Scalable Tree Boosting System [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
- [9] Clark Gradeigh D., 2017, 2017 IEEE Conference on Communications and Network Security (CNS), P1, DOI 10.1109/CNS.2017.8228644
- [10] Cruz Jonathan, 2022, 2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), P1, DOI 10.1109/AsianHOST56390.2022.10022234