[1] |
JIANG Peihe, WANG Chenxu, GUO Gang, WEI Yinsheng.
Research on Hardware Trojan Detection for FPGA Application
[J]. Computer Engineering and Applications, 2021, 57(20): 119-124.
|
[2] |
ZHANG Haoyu, YING Jianfeng, SONG Chenyu, WANG Keke, YI Maoxiang.
Hardware Trojan Monitoring and Protection for Circuit Critical Path
[J]. Computer Engineering and Applications, 2020, 56(6): 73-78.
|
[3] |
CHEN Xin, GAO Liangjun, REN Chuanbao, YI Maoxiang, HUANG Zhengfeng.
Hardware Trojan Detection Based on Transition Probability and RO Structure
[J]. Computer Engineering and Applications, 2020, 56(3): 49-54.
|
[4] |
LI Xiongwei1, WEI Yanhai1, WANG Xiaohan1, XU Lu2, SUN Ping3.
Improved Incremental SVDD Learning Algorithm for Hardware Trojan Detection
[J]. Computer Engineering and Applications, 2019, 55(9): 43-48.
|
[5] |
WANG Yong, FANG Xiaoqiang, WANG Ying.
Hyperchaos System and AES Combined with Image Encryption Algorithm
[J]. Computer Engineering and Applications, 2019, 55(8): 164-170.
|
[6] |
YANG Daming, HUANG Jiaoying, GAO Cheng.
Power analysis method of hardware Trojan detection considering process variation
[J]. Computer Engineering and Applications, 2018, 54(24): 1-5.
|
[7] |
WANG Yong, ZHU Guang, WANG Ying.
Hyperchaotic image encryption algorithm based on cellular neural network and AES algorithm
[J]. Computer Engineering and Applications, 2018, 54(21): 194-200.
|
[8] |
WANG Yong, LI Jinyang, WANG Ying.
Hyperchaotic image encryption algorithm based on 4D of Hopfield-type neural network and AES algorithm
[J]. Computer Engineering and Applications, 2018, 54(17): 202-207.
|
[9] |
CHENG Zhao1,2, WANG Heming1, TANG Yongkang2, ZHANG Ying1.
Detail enhancement analysis based hardware Trojan detection using thermal maps
[J]. Computer Engineering and Applications, 2018, 54(16): 86-92.
|
[10] |
LI Xiongwei, XU Lu, ZHANG Yang, WANG Xiaohan, CHEN Kaiyan.
Side channel signals feature selection method oriented to hardware Trojan detection
[J]. Computer Engineering and Applications, 2017, 53(21): 258-262.
|
[11] |
TANG Yongkang1, WANG Jianye1, LI Shaoqing2, LIU Yongcong1.
Analysis on infrared spectrum based hardware Trojan detection approach
[J]. Computer Engineering and Applications, 2017, 53(12): 110-115.
|
[12] |
LI Heng1, ZHAO Yiqiang2, YANG Ruixia1, HE Jiaji2, LI Yuehui2, YANG Song2.
Hardware Trojan detection optimization based on wavelet de-noising data preprocessing
[J]. Computer Engineering and Applications, 2017, 53(1): 49-53.
|
[13] |
ZHAO Yuehua, MA Linlin.
Research of AES’s lightweight complementation technique
[J]. Computer Engineering and Applications, 2015, 51(6): 79-83.
|
[14] |
LI Yongda, WANG Danghui, HUANG Xiaoping.
ZIP password recovery on GPU
[J]. Computer Engineering and Applications, 2015, 51(2): 190-193.
|
[15] |
LIU Lan1, YAO Xingzhong2, WANG Zhenyu1, YANG Xiaofei1.
FPGA implementation of “One Frame One Key” encryption/decryption solution suitable for CCSDS
[J]. Computer Engineering and Applications, 2015, 51(10): 84-88.
|