[1] |
JIANG Peihe, WANG Chenxu, GUO Gang, WEI Yinsheng.
Research on Hardware Trojan Detection for FPGA Application
[J]. Computer Engineering and Applications, 2021, 57(20): 119-124.
|
[2] |
LIU Guizhi.
Incremental Attribute Reduction of Incomplete Hybrid Data Based on Dimension Change
[J]. Computer Engineering and Applications, 2021, 57(12): 161-169.
|
[3] |
XIONG Lin, TANG Wanmei.
Incremental Learning Algorithm Based on Heterogeneous Classifier Ensemble
[J]. Computer Engineering and Applications, 2020, 56(7): 155-161.
|
[4] |
ZHANG Haoyu, YING Jianfeng, SONG Chenyu, WANG Keke, YI Maoxiang.
Hardware Trojan Monitoring and Protection for Circuit Critical Path
[J]. Computer Engineering and Applications, 2020, 56(6): 73-78.
|
[5] |
CHEN Xin, GAO Liangjun, REN Chuanbao, YI Maoxiang, HUANG Zhengfeng.
Hardware Trojan Detection Based on Transition Probability and RO Structure
[J]. Computer Engineering and Applications, 2020, 56(3): 49-54.
|
[6] |
WU Yangyang, TANG Jianguo.
Research Progress of Attribute Reduction Based on Rough Set in Context of Big Data
[J]. Computer Engineering and Applications, 2019, 55(6): 31-38.
|
[7] |
HU Xiaoyang, CHEN Kaiyan, ZHANG Yang, GUO Dongxin, WEI Yanhai.
RSA Electromagnetic Side-Channel Analysis Method Based on Support Vector Machine
[J]. Computer Engineering and Applications, 2019, 55(15): 141-146.
|
[8] |
WU Jingfeng, JIN Weidong, TANG Peng.
Catenary Pillar Image Anomaly Detection Combined with SVDD and CNN
[J]. Computer Engineering and Applications, 2019, 55(10): 193-198.
|
[9] |
YI Yang, ZHOU Shaoguang, ZHAO Pengfei, HU Yiqun.
Classification method of remote sensing image based on positive and unlabeled data
[J]. Computer Engineering and Applications, 2018, 54(4): 160-166.
|
[10] |
YANG Daming, HUANG Jiaoying, GAO Cheng.
Power analysis method of hardware Trojan detection considering process variation
[J]. Computer Engineering and Applications, 2018, 54(24): 1-5.
|
[11] |
XING Zhiwei1, JIANG Junxian1, LUO Xiao2, LUO Qian2.
Dynamic estimation about estimated taxi-out time based on Bayesian network
[J]. Computer Engineering and Applications, 2018, 54(24): 66-71.
|
[12] |
KONG Xiangxin, ZHOU Wei, WANG Xiaodan, YU Mingqiu.
Removing algorithm for incremental SVDD learning
[J]. Computer Engineering and Applications, 2018, 54(18): 174-179.
|
[13] |
CHENG Zhao1,2, WANG Heming1, TANG Yongkang2, ZHANG Ying1.
Detail enhancement analysis based hardware Trojan detection using thermal maps
[J]. Computer Engineering and Applications, 2018, 54(16): 86-92.
|
[14] |
WANG Xiaohan, LI Xiongwei, ZHANG Yang, XU Lu.
AES differential fault analysis based on hardware Trojan
[J]. Computer Engineering and Applications, 2017, 53(5): 103-106.
|
[15] |
LI Xiongwei, XU Lu, ZHANG Yang, WANG Xiaohan, CHEN Kaiyan.
Side channel signals feature selection method oriented to hardware Trojan detection
[J]. Computer Engineering and Applications, 2017, 53(21): 258-262.
|