共 50 条
- [11] Identifying Vulnerabilities in Trust and Reputation Systems PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 308 - 314
- [12] Stack engineering for ReRAM devices performance improvement 2014 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2014, : 846 - 849
- [13] Selector Devices for Cross-point ReRAM 2012 13TH INTERNATIONAL WORKSHOP ON CELLULAR NANOSCALE NETWORKS AND THEIR APPLICATIONS (CNNA), 2012,
- [15] A Simple Memristor Model for Neuromorphic ReRAM Devices 2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
- [16] Camouflage circuitry and programmable cells to secure semiconductor designs during manufacturing Track: Trust in Microelectronics PROCEEDINGS OF THE 2015 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2015, : 141 - 145
- [18] Understanding Linux kernel vulnerabilities Journal of Computer Virology and Hacking Techniques, 2021, 17 : 265 - 278
- [20] Concept of the mobility edge, a detriment toward the understanding of disordered semiconductor devices Applied physics communications, 1994, 13 (3-4): : 177 - 186