ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Hardware Trojan Detection Method for Gate-Level Netlists Based on the Idea of Few-Shot Learning
Mapping Intimacies
◽
10.1109/icct52962.2021.9657930
◽
2021
◽
Author(s):
Tong Lu
◽
Fang Zhou
◽
Ning Wu
◽
Fen Ge
◽
Benjun Zhang
Keyword(s):
Detection Method
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Related Documents
Cited By
References
Hardware Trojan Detection Combines with Machine Learning: an Isolation Forest-based Detection Method
2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE)
◽
10.1109/bigdatase50710.2020.00021
◽
2020
◽
Author(s):
Taifeng Hu
◽
Liji Wu
◽
Xiangmin Zhang
◽
Zhaopo Liao
Keyword(s):
Machine Learning
◽
Detection Method
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
◽
Isolation Forest
Download Full-text
A Hardware Trojan Detection Method for IoT Sensors using Side Channel Activity Magnifier
IEEE Internet of Things Journal
◽
10.1109/jiot.2021.3105286
◽
2021
◽
pp. 1-1
Author(s):
E. Jedari
◽
R. Rashidzadeh
Keyword(s):
Detection Method
◽
Side Channel
◽
Hardware Trojan
◽
Channel Activity
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
A hardware Trojan detection method based on the electromagnetic leakage
China Communications
◽
10.23919/jcc.2019.12.007
◽
2019
◽
Vol 16
(12)
◽
pp. 100-110
◽
Cited By ~ 1
Author(s):
Lei Zhang
◽
Youheng Dong
◽
Jianxin Wang
◽
Chaoen Xiao
◽
Ding Ding
Keyword(s):
Detection Method
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
A Hardware Trojan Detection Method Based on Side-channel Analysis
Proceedings of the 2015 International Conference on Electrical, Computer Engineering and Electronics
◽
10.2991/icecee-15.2015.197
◽
2015
◽
Author(s):
Xiaohan Wang
◽
Xiongwei LI
◽
Lu XU
Keyword(s):
Detection Method
◽
Side Channel
◽
Hardware Trojan
◽
Side Channel Analysis
◽
Hardware Trojan Detection
◽
Trojan Detection
◽
Channel Analysis
Download Full-text
Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method
IEEE Access
◽
10.1109/access.2018.2887268
◽
2019
◽
Vol 7
◽
pp. 5124-5140
◽
Cited By ~ 4
Author(s):
Mingfu Xue
◽
Rongzhen Bian
◽
Weiqiang Liu
◽
Jian Wang
Keyword(s):
Detection Method
◽
Hardware Trojan
◽
Clustering Ensemble
◽
Hybrid Clustering
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Hardware Trojan Detection Method for Inspecting Integrated Circuits Based on Machine Learning
2021 22nd International Symposium on Quality Electronic Design (ISQED)
◽
10.1109/isqed51717.2021.9424314
◽
2021
◽
Author(s):
Yuze Wang
◽
Peng Liu
◽
Xiaoxia Han
◽
Yingtao Jiang
Keyword(s):
Machine Learning
◽
Integrated Circuits
◽
Detection Method
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Hardware Trojan Detection Method Based on Multi-featured GEP
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Quality, Reliability, Security and Robustness in Heterogeneous Systems
◽
10.1007/978-3-030-77569-8_2
◽
2021
◽
pp. 22-37
Author(s):
Huan Zhang
◽
Jiliu Zhou
◽
Xi Wu
◽
Yi Zhang
Keyword(s):
Detection Method
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
A novel hardware Trojan detection method based on side-channel analysis and PCA algorithm
2014 10th International Conference on Reliability, Maintainability and Safety (ICRMS)
◽
10.1109/icrms.2014.7107362
◽
2014
◽
Cited By ~ 6
Author(s):
Chunhua He
◽
Bo Hou
◽
Liwei Wang
◽
Yunfei En
◽
Shaofeng Xie
Keyword(s):
Detection Method
◽
Side Channel
◽
Hardware Trojan
◽
Side Channel Analysis
◽
Hardware Trojan Detection
◽
Trojan Detection
◽
Channel Analysis
◽
Pca Algorithm
Download Full-text
Hardware Trojan detection method based on the frequency domain characteristics of power consumption
2020 13th International Symposium on Computational Intelligence and Design (ISCID)
◽
10.1109/iscid51228.2020.00099
◽
2020
◽
Author(s):
Nan Tang
◽
Wanting Zhou
◽
Lei Li
◽
Ji Yang
◽
Rui Li
◽
...
Keyword(s):
Power Consumption
◽
Frequency Domain
◽
Detection Method
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Multi adaptive hardware Trojan detection method based on power characteristics template
2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS)
◽
10.1109/ccis.2016.7790294
◽
2016
◽
Author(s):
Lei Zhang
◽
Kewang Sun
◽
Qi Cui
◽
Sixiang Wang
◽
Xiaolin Li
◽
...
Keyword(s):
Detection Method
◽
Hardware Trojan
◽
Power Characteristics
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close