1. Lecture Notes in Computer Science;RS Chakraborty,2009
2. Xue, M., Hu, A., Huang, Y., Li, G.: Monte Carlo based test pattern generation for hardware Trojan detection. In: IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 131–136 (2013)
3. Nowroz, A.N., Hu, K., Koushanfar, F., Reda, S.: Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 33(12), 1792–1805 (2014)
4. Xue, M., Liu, W., Hu, A., Wang, Y.: Detecting hardware Trojan through time domain constrained estimator based unified subspace technique. IEICE Trans. Inf. Syst. 97(3), 606–609 (2014)
5. Xue, M., Hu, A., Li, G.: Detecting hardware Trojan through heuristic partition and activity driven test pattern generation. In: Communications Security Conference (CSC), pp. 1–6. IET (2014)