ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Physical Hardware Trojan Failure Analysis and Detection Method
Mechatronics and Automation Engineering
◽
10.1142/9789813208537_0059
◽
2017
◽
Author(s):
Yang Luo
◽
Ya-Nan Wang
Keyword(s):
Failure Analysis
◽
Detection Method
◽
Hardware Trojan
Download Full-text
Related Documents
Cited By
References
Physical hardware trojan failure analysis and detection method
Acta Physica Sinica
◽
10.7498/aps.65.110602
◽
2016
◽
Vol 65
(11)
◽
pp. 110602
Author(s):
Luo Yang
◽
Wang Ya-Nan
Keyword(s):
Failure Analysis
◽
Detection Method
◽
Hardware Trojan
Download Full-text
Hardware Trojan Detection Combines with Machine Learning: an Isolation Forest-based Detection Method
2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE)
◽
10.1109/bigdatase50710.2020.00021
◽
2020
◽
Author(s):
Taifeng Hu
◽
Liji Wu
◽
Xiangmin Zhang
◽
Zhaopo Liao
Keyword(s):
Machine Learning
◽
Detection Method
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
◽
Isolation Forest
Download Full-text
A Hardware Trojan Detection Method for IoT Sensors using Side Channel Activity Magnifier
IEEE Internet of Things Journal
◽
10.1109/jiot.2021.3105286
◽
2021
◽
pp. 1-1
Author(s):
E. Jedari
◽
R. Rashidzadeh
Keyword(s):
Detection Method
◽
Side Channel
◽
Hardware Trojan
◽
Channel Activity
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Research on the Detection Method of HOG-SVM for Doping Modified Hardware Trojan
Journal of Physics Conference Series
◽
10.1088/1742-6596/1550/3/032086
◽
2020
◽
Vol 1550
◽
pp. 032086
Author(s):
Chaolong Sun
◽
Lei Li
◽
Wanting Zhou
◽
Xianjun Tan
◽
Yuanhang He
Keyword(s):
Detection Method
◽
Hardware Trojan
Download Full-text
A hardware Trojan detection method based on the electromagnetic leakage
China Communications
◽
10.23919/jcc.2019.12.007
◽
2019
◽
Vol 16
(12)
◽
pp. 100-110
◽
Cited By ~ 1
Author(s):
Lei Zhang
◽
Youheng Dong
◽
Jianxin Wang
◽
Chaoen Xiao
◽
Ding Ding
Keyword(s):
Detection Method
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
A Novel Detection Method for Hardware Trojan in Third Party IP Cores
2016 International Conference on Information System and Artificial Intelligence (ISAI)
◽
10.1109/isai.2016.0118
◽
2016
◽
Cited By ~ 1
Author(s):
Er-Rui Zhou
◽
Shao-Qing Li
◽
Ji-Hua Chen
◽
Lin Ni
◽
Zhi-Xun Zhao
◽
...
Keyword(s):
Detection Method
◽
Third Party
◽
Hardware Trojan
◽
Ip Cores
Download Full-text
A Hardware Trojan Detection Method Based on Side-channel Analysis
Proceedings of the 2015 International Conference on Electrical, Computer Engineering and Electronics
◽
10.2991/icecee-15.2015.197
◽
2015
◽
Author(s):
Xiaohan Wang
◽
Xiongwei LI
◽
Lu XU
Keyword(s):
Detection Method
◽
Side Channel
◽
Hardware Trojan
◽
Side Channel Analysis
◽
Hardware Trojan Detection
◽
Trojan Detection
◽
Channel Analysis
Download Full-text
A machine learning based golden-free detection method for command-activated hardware Trojan
Information Sciences
◽
10.1016/j.ins.2020.05.053
◽
2020
◽
Vol 540
◽
pp. 292-307
Author(s):
Ning Shang
◽
An Wang
◽
Yaoling Ding
◽
Keke Gai
◽
Liehuang Zhu
◽
...
Keyword(s):
Machine Learning
◽
Detection Method
◽
Hardware Trojan
Download Full-text
Detection Method of Hardware Trojan Based on Wavelet Noise Reduction and Neural Network
Cloud Computing and Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-00018-9_23
◽
2018
◽
pp. 256-265
Author(s):
Xiaopeng Li
◽
Fei Xiao
◽
Ling Li
◽
Jiangjiang Shen
◽
Fengchen Qian
Keyword(s):
Neural Network
◽
Noise Reduction
◽
Detection Method
◽
Hardware Trojan
Download Full-text
Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method
IEEE Access
◽
10.1109/access.2018.2887268
◽
2019
◽
Vol 7
◽
pp. 5124-5140
◽
Cited By ~ 4
Author(s):
Mingfu Xue
◽
Rongzhen Bian
◽
Weiqiang Liu
◽
Jian Wang
Keyword(s):
Detection Method
◽
Hardware Trojan
◽
Clustering Ensemble
◽
Hybrid Clustering
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close