Author:
Dubeuf Jeremy,Hely David,Karri Ramesh
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure Run-Time Hardware Trojan Detection Using Lightweight Analytical Models;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2024-02
2. Detection Method of Hardware Trojan Based on Attention Mechanism and Residual-Dense-Block under the Markov Transition Field;Journal of Electronic Testing;2023-12
3. Improving the Detection of Hardware Trojan Horses in Microprocessors via Hamming Codes;2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT);2023-10-03
4. Towards Dependable RISC-V Cores for Edge Computing Devices;2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS);2023-07-03
5. DEV-PIM: Dynamic Execution Validation with Processing-in-Memory;2023 IEEE European Test Symposium (ETS);2023-05-22