Runtime Identification of Hardware Trojans by Feature Analysis on Gate-Level Unstructured Data and Anomaly Detection.
Arunkumar VijayanMehdi B. TahooriKrishnendu ChakrabartyPublished in: ACM Trans. Design Autom. Electr. Syst. (2020)
Keyphrases
- anomaly detection
- feature analysis
- unstructured data
- structured data
- intrusion detection
- textual data
- semi structured
- detect anomalies
- relational databases
- unsupervised learning
- big data
- face recognition
- data warehouse
- feature extraction
- intrusion detection system
- information management
- active learning
- information extraction
- business intelligence
- pattern recognition
- computer vision
- machine learning
- data sets