共 20 条
- [1] Çakir B, 2015, DES AUT TEST EUROPE, P471
- [2] CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
- [4] Francq J, 2015, DES AUT TEST EUROPE, P770
- [5] Goutte C, 2005, LECT NOTES COMPUT SC, V3408, P345
- [6] Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 159 - 172
- [7] Hsu C.W., 2003, PRACTICAL GUIDE SUPP
- [8] Iwase T, 2015, 2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), P185, DOI 10.1109/GCCE.2015.7398569
- [9] Kohavi R., 1995, Proceedings of the 14th International Joint Conference on Artificial Intelligence, V2, P1137
- [10] Kulkarni A, 2016, INT SYM QUAL ELECT, P362, DOI 10.1109/ISQED.2016.7479228