Cited By
View all- Wei XZhang JLuo G(2024)Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00160(3789-3804)Online publication date: 19-May-2024
- Hu XZhang YLi ZLi S(2024)CA4TJ: Correlational Analysis for Always-On Information-Leakage Hardware Trojan Detecting2024 IEEE International Test Conference in Asia (ITC-Asia)10.1109/ITC-Asia62534.2024.10661328(1-6)Online publication date: 18-Aug-2024
- Mondal AKalita DGhosh ARoy SSen B(2023)Toward the Generation of Test Vectors for the Detection of Hardware Trojan Targeting Effective Switching ActivityACM Journal on Emerging Technologies in Computing Systems10.1145/359749719:4(1-16)Online publication date: 19-May-2023
- Show More Cited By