共 50 条
- [21] A logic obfuscation attack method based on gate-level information flow tracing techniques Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2024, 42 (01): : 78 - 83
- [22] FIGHT-Metric: Functional Identification of Gate-Level Hardware Trustworthiness 2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
- [25] Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs IET COMPUTERS AND DIGITAL TECHNIQUES, 2018, 12 (06): : 251 - 257
- [26] Hardware Trojans classification based on controllability and observability in gate-level netlist IEICE ELECTRONICS EXPRESS, 2017, 14 (18):
- [27] Hardware Trojan Detection with Linear Regression Based Gate-Level Characterization 2014 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS), 2014, : 256 - 259
- [28] Hardware Trojans Classification for Gate-level Netlists based on Machine Learning 2016 IEEE 22ND INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS), 2016, : 203 - 206
- [29] Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 341 - 359
- [30] An evolutionary robot navigation system using a gate-level evolvable hardware EVOLVABLE SYSTEMS: FROM BIOLOGY TO HARDWARE, 1997, 1259 : 195 - 209