共 10 条
[3]
[Anonymous], 2011, P 4 ACM WORKSHOP SEC, DOI DOI 10.1145/2046684.2046692
[4]
Aramoon O, 2020, INT SYM QUAL ELECT, P352, DOI [10.1109/isqed48828.2020.9136972, 10.1109/ISQED48828.2020.9136972]
[5]
Machine Learning Assisted Accurate Estimation of Usage Duration and Manufacturer for Recycled and Counterfeit Flash Memory Detection
[J].
2019 IEEE 28TH ASIAN TEST SYMPOSIUM (ATS),
2019,
:49-54
[6]
Duan S., 2021, Emerging Topics in Hardware Security, P111
[7]
Machine Learning for Hardware Security: Opportunities and Risks
[J].
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS,
2018, 34 (02)
:183-201
[8]
Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead
[J].
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS,
2014, 30 (01)
:9-23
[9]
Hasegawa K, 2016, IEEE INT ON LINE, P203, DOI 10.1109/IOLTS.2016.7604700
[10]
Kulkarni A, 2016, PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P120, DOI 10.1109/HST.2016.7495568