ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
trojan detection
Recently Published Documents
TOTAL DOCUMENTS
406
(FIVE YEARS 169)
H-INDEX
29
(FIVE YEARS 4)
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Hardware Trojan Detection Using Deep Learning-Generative Adversarial Network and Stacked Auto Encoder Neural Networks
ICT Analysis and Applications - Lecture Notes in Networks and Systems
◽
10.1007/978-981-16-5655-2_19
◽
2022
◽
pp. 203-210
Author(s):
Fredin Jose
◽
M. Priyatharishini
◽
M. Nirmala Devi
Keyword(s):
Neural Networks
◽
Deep Learning
◽
Hardware Trojan
◽
Generative Adversarial Network
◽
Adversarial Network
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Hardware-Trojan Detection based on the Structural Features of Trojan Circuits Using Random Forests
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
◽
10.1587/transfun.2021eap1091
◽
2022
◽
Author(s):
Tatsuki KURIHARA
◽
Nozomu TOGAWA
Keyword(s):
Random Forests
◽
Structural Features
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
A Pre-Activation, Golden IC Free, Hardware Trojan Detection Approach
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
◽
10.1109/tvlsi.2021.3138303
◽
2022
◽
pp. 1-10
Author(s):
Hamidreza Esmaeili Taheri
◽
Mitra Mirhassani
Keyword(s):
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
◽
Detection Approach
Download Full-text
Efficient Machine Learning Model for Hardware Trojan Detection on Register Transfer Level
10.1109/icspis53734.2021.9652443
◽
2021
◽
Author(s):
Fajar Wijitrisnanto
◽
Sarwono Sutikno
◽
Septafiansyah Dwi Putra
Keyword(s):
Machine Learning
◽
Learning Model
◽
Register Transfer Level
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
◽
Machine Learning Model
◽
Register Transfer
◽
Efficient Machine
Download Full-text
Performance Enhancement by Tuning Hyperparameters of Random Forest Classifier for Hardware Trojan Detection
10.1007/978-981-16-5120-5_14
◽
2021
◽
pp. 177-191
Author(s):
Matli Nishanth Reddy
◽
M. R. Latchmana Kumar
◽
Pusarla Bhaskara Sai Kumar
◽
S. Thirumalai
◽
M. Nirmala Devi
Keyword(s):
Random Forest
◽
Performance Enhancement
◽
Random Forest Classifier
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
SeGa: A Trojan Detection Method Combined With Gate Semantics
10.1109/ats52891.2021.00020
◽
2021
◽
Author(s):
Yunying Ye
◽
Shan Li
◽
Haihua Shen
◽
Huawei Li
◽
Xiaowei Li
Keyword(s):
Detection Method
◽
Trojan Detection
Download Full-text
Hardware Trojan Detection Method for Gate-Level Netlists Based on the Idea of Few-Shot Learning
10.1109/icct52962.2021.9657930
◽
2021
◽
Author(s):
Tong Lu
◽
Fang Zhou
◽
Ning Wu
◽
Fen Ge
◽
Benjun Zhang
Keyword(s):
Detection Method
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
SC-COTD: Hardware Trojan Detection Based on Sequential/Combinational Testability Features using Ensemble Classifier
Journal of Electronic Testing
◽
10.1007/s10836-021-05960-2
◽
2021
◽
Author(s):
Mahshid Tebyanian
◽
Azadeh Mokhtarpour
◽
Alireza Shafieinejad
Keyword(s):
Ensemble Classifier
◽
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Character Reassignment for Hardware Trojan Detection
10.1109/mwscas47672.2021.9531813
◽
2021
◽
Author(s):
Noah Waller
◽
Hunter Nauman
◽
Derek Taylor
◽
Rafael Del Carmen
◽
Jia Di
Keyword(s):
Hardware Trojan
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Hardware Trojan Detection Based on Image Comparison
Advances in Intelligent Automation and Soft Computing - Lecture Notes on Data Engineering and Communications Technologies
◽
10.1007/978-3-030-81007-8_112
◽
2021
◽
pp. 979-986
Author(s):
Chen Sun
◽
Xiaohui Guo
◽
Lingling Li
◽
Jingjing Ma
Keyword(s):
Hardware Trojan
◽
Image Comparison
◽
Hardware Trojan Detection
◽
Trojan Detection
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close