Sign in

Defense Against On-Chip Trojans Enabling Traffic Analysis Attacks Based on Machine Learning and Data Augmentation.

Abhijitt DhavlleM. Meraj AhmedNaseef MansoorKanad BasuAmlan GangulySai Manoj Pudukotai Dinakarrao
Published in: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. (2023)
Keyphrases
  • traffic analysis
  • machine learning
  • data analysis
  • knowledge discovery
  • network security
  • active learning
  • data sources
  • data processing
  • traffic data
  • data mining
  • data points
  • information extraction
  • computer networks