共 43 条
[1]
Almeida Leandro M., 2008, EVOLUTIONARY APPROAC, P156
[2]
Comparative Analysis of Hardware Obfuscation for IP Protection
[J].
PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17),
2017,
:363-368
[3]
Threats on Logic Locking: A Decade Later
[J].
GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI,
2019,
:471-476
[4]
Machine Learning and Structural Characteristics for Reverse Engineering
[J].
24TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC 2019),
2019,
:96-103
[5]
Bhunia S., 2019, 2019 ASIANHOST, P1
[6]
BRGLEZ F, 1989, 1989 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-3, P1929, DOI 10.1109/ISCAS.1989.100747
[7]
Chakraborty P, 2018, PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), P56, DOI 10.1109/AsianHOST.2018.8607163
[8]
Chakravarty P, 2019, IDEA OF THE UNIVERSITY: HISTORIES AND CONTEXTS, P181, DOI [10.1109/hst.2019.8741028, 10.1109/HST.2019.8741028]
[9]
Chen H., 2019, 2019 IEEE ACM ICCAD, P1
[10]
Chen ZQ, 2020, DES AUT TEST EUROPE, P358, DOI [10.23919/date48585.2020.9116544, 10.23919/DATE48585.2020.9116544]