A Few Shot Learning based Approach for Hardware Trojan Detection using Deep Siamese CNN
暂无分享,去创建一个
[1] Damon L. Woodard,et al. Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives , 2020, ArXiv.
[2] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[3] Qiang Liu,et al. A survey of hardware Trojan threat and defense , 2016, Integr..
[4] Ajay Joshi,et al. Detecting Hardware Trojans using backside optical imaging of embedded watermarks , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[5] Ankur Srivastava,et al. On Reverse Engineering-Based Hardware Trojan Detection , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[6] Yann LeCun,et al. Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..
[7] Nidish Vashistha,et al. Trojan Scanner: Detecting Hardware Trojans with Rapid SEM Imaging Combined with Image Processing and Machine Learning , 2018, ISTFA 2018: Conference Proceedings from the 44th International Symposium for Testing and Failure Analysis.
[8] Mark Mohammad Tehranipoor,et al. Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing , 2018, Journal of Hardware and Systems Security.
[9] Xiaohong Jiang,et al. A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges , 2020, IEEE Access.
[10] Assia Tria,et al. SEMBA: A SEM based acquisition technique for fast invasive Hardware Trojan detection , 2015, 2015 European Conference on Circuit Theory and Design (ECCTD).
[11] Abdurrahman A. Nasr,et al. Automatic Feature Selection of Hardware Layout: A Step toward Robust Hardware Trojan Detection , 2016, J. Electron. Test..
[12] Mark Mohammad Tehranipoor,et al. On design vulnerability analysis and trust benchmarks development , 2013, 2013 IEEE 31st International Conference on Computer Design (ICCD).
[13] Ankur Srivastava,et al. On application of one-class SVM to reverse engineering-based hardware Trojan detection , 2014, Fifteenth International Symposium on Quality Electronic Design.
[14] Nan Chen,et al. Wafer Map Defect Pattern Recognition Using Rotation-Invariant Features , 2019, IEEE Transactions on Semiconductor Manufacturing.
[15] Yu-Chiang Frank Wang,et al. A Closer Look at Few-shot Classification , 2019, ICLR.
[16] Assia Tria,et al. A high efficiency Hardware Trojan detection technique based on fast SEM imaging , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[17] Abdurrahman A. Nasr,et al. An Efficient Reverse Engineering Hardware Trojan Detector Using Histogram of Oriented Gradients , 2017, J. Electron. Test..