Author:
Yang Kaiyuan,Hicks Matthew,Dong Qing,Austin Todd,Sylvester Dennis
Cited by
181 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. DETERRENT: Detecting Trojans Using Reinforcement Learning;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2024-01
2. Simulation-Based Approach to Generating Golden Data for PCB-Level Hardware Trojan Detection Using Capacitive Sensor;2023 IEEE Physical Assurance and Inspection of Electronics (PAINE);2023-10-24
3. Hardware Root-of-Trust Support for Operational Technology Cybersecurity in Critical Infrastructures;2023 IEEE High Performance Extreme Computing Conference (HPEC);2023-09-25
4. Hardware Security Risks and Threat Analyses in Advanced Manufacturing Industry;ACM Transactions on Design Automation of Electronic Systems;2023-09-09
5. T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing;Proceedings of the ACM Asia Conference on Computer and Communications Security;2023-07-10