Author:
Samimi Mohammad Saleh,Aerabi Ehsan,Kazemi Zahra,Fazeli Mahdi,Patooghy Ahmad
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Design for Trust Utilizing Rareness Reduction;2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID);2024-01-06
2. Hardware Trojans: Threats, Detection, and Prevention;Proceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management;2023-11-24
3. Security Closure of IC Layouts Against Hardware Trojans;Proceedings of the 2023 International Symposium on Physical Design;2023-03-26
4. Analysis of the Satisfiability Attack Against Logic Encryption Using Synthetic Benchmarks;2022 IEEE International Symposium on Smart Electronic Systems (iSES);2022-12
5. ISPLock: A Hybrid Internal State Locking Method Using Polymorphic Gates;2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI);2022-07