共 50 条
[21]
A Co-Training based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models
[J].
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE),
2018,
:1452-1457
[22]
Investigation and Design of the Efficient Hardware-based RNG for Cryptographic Applications
[J].
2014 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED),
2014,
:255-260
[24]
A Novel Hardware Trojan Detection Based on BP Neural Network
[J].
2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC),
2016,
:2790-2794
[25]
Property Based Formal Security Verification for Hardware Trojan Detection
[J].
2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW),
2018,
:62-67
[26]
Efficient Node-wise Hardware Trojan Detection with Rapid Recovery for RISC-V Processors
[J].
IEICE ELECTRONICS EXPRESS,
2025,
[27]
Securing Instant Messages With Hardware-Based Cryptography and Authentication in Browser Extension
[J].
IEEE ACCESS,
2020, 8
:95137-95152
[28]
Towards Trustworthy Data in Networked Control Systems: A Hardware-Based Approach
[J].
2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA),
2017,
[29]
Monte Carlo based Test Pattern Generation for Hardware Trojan Detection
[J].
2013 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC),
2013,
:131-136
[30]
An Efficient Hardware Trojan Detection Approach adopting Testability based Features
[J].
2020 IEEE INTERNATIONAL TEST CONFERENCE INDIA (ITC INDIA),
2020,
:55-59