CORC

浏览/检索结果: 共65条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Novel methods for locating and matching IC cells based on standard cell libraries 期刊论文
MICROELECTRONIC ENGINEERING, 2024, 卷号: 283, 页码: 12
作者:  Liu, Can;  Wang, Kaige;  Li, Qing;  Zhao, Fazhan;  Zhao, Kun
收藏  |  浏览/下载:4/0  |  提交时间:2024/02/22
Practical Attacks on Deep Neural Networks by Memory Trojaning 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 卷号: 40, 期号: 6, 页码: 1230-1243
作者:  Hu, Xing;  Zhao, Yang;  Deng, Lei;  Liang, Ling;  Zuo, Pengfei
收藏  |  浏览/下载:21/0  |  提交时间:2021/12/01
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:  Cai, Yi;  Chen, Xiaoming;  Tian, Lu;  Wang, Yu;  Yang, Huazhong
收藏  |  浏览/下载:32/0  |  提交时间:2020/12/10
PUFPass: A password management mechanism based on software/hardware codesign 期刊论文
Integration, 2019, 卷号: 64, 页码: 173-183
作者:  Guo, Qingli;  Ye, Jing;  Li, Bing;  Hu, Yu;  Li, Xiaowei
收藏  |  浏览/下载:6/0  |  提交时间:2019/11/19
A Multi-Layer Hardware Trojan Protection Framework for IoT Chips 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 23628-23639
作者:  Dong, Chen;  He, Guorong;  Liu, Ximeng;  Yang, Yang;  Guo, Wenzhong
收藏  |  浏览/下载:2/0  |  提交时间:2019/11/21
Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) - Unlocked 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 期号: 10
作者:  Yang, Fangfei;  Tang, Ming;  Sinanoglu, Ozgur
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
HCIC: Hardware-Assisted Control-Flow Integrity Checking 期刊论文
IEEE Internet of Things Journal, 2019, 卷号: Vol.6 No.1, 页码: 458-471
作者:  Zhang, JL;  Qi, BH;  Qin, Z;  Qu, G
收藏  |  浏览/下载:23/0  |  提交时间:2019/12/13
An Architectural-Enhanced Secure Design in Embedded System 会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018-11-23
作者:  Wang, X.;  Xu, B.;  Wang, W.;  Zhang, Z.;  Zhang, X.
收藏  |  浏览/下载:19/0  |  提交时间:2019/12/30
Hardware-Enhanced Protection for the Runtime Data Security in Embedded Systems 期刊论文
ELECTRONICS, 2019, 卷号: 8
作者:  Wang, Weike;  Zhang, Xiaobing;  Hao, Qiang;  Zhang, Zhun;  Xu, Bin
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30
A PCA and Mahalanobis distance-based detection method for logical hardware Trojan 期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 卷号: 31
作者:  Huang, Jiaoying;  Yang, Daming;  Gao, Cheng;  Fu, Chengcheng
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace