Author:
Chuan Xin,Yan Yingjian,Zhang Yilun
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Improving the Detection of Hardware Trojan Horses in Microprocessors via Hamming Codes;2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT);2023-10-03
2. Towards Dependable RISC-V Cores for Edge Computing Devices;2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS);2023-07-03
3. DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN;Journal of Systems Architecture;2022-08
4. Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer;Journal of Systems Architecture;2022-07
5. A Novel VLSI Architecture for Malicious Chip Intrusion in Fetal Heart Rate Monitoring;2022 6th International Conference on Devices, Circuits and Systems (ICDCS);2022-04-21