Login / Signup
Revisiting Trojan Insertion Techniques for Post-Silicon Trojan Detection Evaluation.
Vedika Saravanan
Mohammad Walid Charrwi
Samah Mohamed Saeed
Published in:
ISVLSI (2023)
Keyphrases
</>
automatic detection
detection method
evaluation method
real world
false positives
evaluation process
image processing
website
false alarms
evaluation model
database
object detection
anomaly detection
detection rate
evaluation methods
semiconductor devices