共 47 条
- [2] Trojan detection using IC fingerprinting [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
- [3] Alkabani Yousra, 2009, Proceedings of the 2009 IEEE/ACM International Conference on Computer-Aided Design (ICCAD 2009), P123, DOI 10.1145/1687399.1687426
- [4] [Anonymous], 2016, IEEE ASIAN HARDWAREO, DOI DOI 10.1109/ASIANHOST.2016.7835571
- [5] [Anonymous], 2017, J. Hardw. Syst. Security, P85, DOI [10.1007/s41635-017-0001-6, DOI 10.1007/S41635-017-0001-6]
- [6] Apache A., REDHAWK
- [7] Hardware Trojan Attacks: Threat Analysis and Countermeasures [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247
- [8] Breiman L, 1996, MACH LEARN, V24, P49
- [9] XGBoost: A Scalable Tree Boosting System [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
- [10] D. S. Board, 2005, TASK FORCE HIGH PERF