1. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
2. Kimia Zamiri et al. Azar. 2018 . SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks. IACR TCHES 2019 , 1 ( Nov. 2018 ), 97--122. Kimia Zamiri et al. Azar. 2018. SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks. IACR TCHES 2019, 1 (Nov. 2018), 97--122.
3. D. Sirone et al. 2019 . Functional Analysis Attacks on Logic Locking. In 2019 Design , Automation Test in Europe Conference Exhibition (DATE). D. Sirone et al. 2019. Functional Analysis Attacks on Logic Locking. In 2019 Design, Automation Test in Europe Conference Exhibition (DATE).
4. Hadi Mardani et al. Kamali . 2020 . InterLock: An Intercorrelated Logic and Routing Locking. In ICCAD (Virtual Event, USA). New York, NY, USA, Article 78, 9 pages. Hadi Mardani et al. Kamali. 2020. InterLock: An Intercorrelated Logic and Routing Locking. In ICCAD (Virtual Event, USA). New York, NY, USA, Article 78, 9 pages.
5. Jongyeon Kim and et al. 2015. A technology-agnostic MTJ SPICE model with user-defined dimensions for STT-MRAM scalability studies . In 2015 IEEE Custom Integrated Circuits Conference (CICC). IEEE. Jongyeon Kim and et al. 2015. A technology-agnostic MTJ SPICE model with user-defined dimensions for STT-MRAM scalability studies. In 2015 IEEE Custom Integrated Circuits Conference (CICC). IEEE.