共 50 条
- [1] From Secure Business Process Modeling to Design-Level Security Verification 2017 ACM/IEEE 20TH INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS 2017), 2017, : 123 - 133
- [2] A Survey on Recent Detection Methods of the Hardware Trojans ICSPC'21: 2021 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICPSC), 2021, : 139 - 143
- [4] Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, : 682 - 687
- [5] Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans Proceedings of the 2022 Design, Automation and Test in Europe Conference and Exhibition, DATE 2022, 2022, : 682 - 687
- [6] Design-level Detection of Interactions in Aspect-UML models using Alloy JOURNAL OF OBJECT TECHNOLOGY, 2007, 6 (07): : 137 - 165
- [7] Assume-guarantee verification of source code with design-level assumptions ICSE 2004: 26TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2004, : 211 - 220
- [8] Hardware Trojans Detection at Register Transfer Level Based on Machine Learning 2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
- [9] On the Detection of Always-on Hardware Trojans Supported by a Pre-Silicon Verification Methodology 2019 20TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR/SOC TEST, SECURITY AND VERIFICATION (MTV 2019), 2019, : 25 - 30
- [10] A hardware Trojans design using the correlation analysis of electromagnetic emanation Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (10): : 22 - 25