共 28 条
[1]
[Anonymous], 2013, ACM SIGARCH computer architecture news
[2]
Bilge L., 2012, P 2012 ACM C COMP CO, P833, DOI DOI 10.1145/2382196.2382284
[3]
Bradski G, 2000, DR DOBBS J, V25, P120
[4]
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:20-38
[5]
Elhadi Ammar Ahmed E., 2012, American Journal of Applied Sciences, V9, P283, DOI 10.3844/ajassp.2012.283.288
[7]
MiBench: A free, commercially representative embedded benchmark suite
[J].
WWC-4: IEEE INTERNATIONAL WORKSHOP ON WORKLOAD CHARACTERIZATION,
2001,
:3-14
[8]
Deep Residual Learning for Image Recognition
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:770-778
[9]
When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection
[J].
PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021),
2021,
:85-90
[10]
Henning JL, 2006, ACM SIGARCH Computer Architecture News, V34, P1, DOI DOI 10.1145/1186736.1186737