共 26 条
- [1] Arthur D, 2007, PROCEEDINGS OF THE EIGHTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P1027
- [2] A region based approach for the identification of hardware Trojans [J]. 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 40 - 47
- [4] Chakraborty RS, 2009, LECT NOTES COMPUT SC, V5747, P396
- [6] Graf J, 2016, PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P91, DOI 10.1109/HST.2016.7495563
- [7] Guo XL, 2019, PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P91, DOI 10.1109/HST.2019.8740840
- [8] Guobin Li, 2010, Proceedings 2010 3rd International Symposium on Computational Intelligence and Design (ISCID 2010), P167, DOI 10.1109/ISCID.2010.131
- [10] Hardware Trojans in Wireless Cryptographic ICs [J]. IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01): : 26 - 35