共 29 条
- [2] A Novel Approach to Detecting Hardware Trojan Horses [J]. 2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 43 - 46
- [5] A Board-level Hardware Trojan Detection Method [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 11 - 15
- [6] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage [J]. 中国通信, 2019, 16 (12) : 100 - 110
- [7] A Novel Hardware Trojan Detection Method Based on Side-Channel Analysis and PCA Algorithm [J]. PROCEEDINGS OF 2014 10TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY (ICRMS), VOLS I AND II, 2014, : 1043 - 1046
- [8] Hardware Trojan Detection Method Based on Time Feature of Chip Temperature [J]. 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 1029 - 1032