Author:
Zhong Jingxin,Wang Jianye
Subject
Electrical and Electronic Engineering,Atomic and Molecular Physics, and Optics,Electronic, Optical and Magnetic Materials
Reference12 articles.
1. Hardware Trojan: threats and emerging solutions;Chakraborty,2009
2. Trojan detection using IC fingerprinting;Agrawal,2007
3. Cost-efficient acceleration of hardware Trojan detection through fan-out cone analysis and weighted random pattern technique;Zhou;IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst.,2016
4. Reverse engineering digital circuits using functional analysis;Subramanyan,2013
5. A flexible online checking technique to enhance hardware Trojan horse detectability by reliability analysis;Chakraborty;IEEE Trans. Emerg. Top. Comput.,2017
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hardware Trojans Detection and Prevention Techniques Review;Wireless Personal Communications;2024-05
2. A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks;Journal of King Saud University - Computer and Information Sciences;2023-12
3. Neural Networks & Logistic Regression for FPGA Hardware Trojan Detection;2023 5th Iranian International Conference on Microelectronics (IICM);2023-10-25
4. Review on Hardware Trojan Detection Techniques;National Academy Science Letters;2023-05-20
5. RLocHT: A Hardware Trojans Localization Method Utilizing Deep Learning at the Gate-Level;2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC);2022-06-17