An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans.
Kyle J. TemkinDouglas H. SummervillePublished in: CISRC (2016)
Keyphrases
- detection method
- high precision
- synthetic data
- preprocessing
- pairwise
- experimental evaluation
- clustering method
- probabilistic model
- computer vision
- false positive rate
- detection algorithm
- theoretical analysis
- low cost
- dynamic programming
- significant improvement
- artificial neural networks
- image processing
- real time
- support vector machine
- high accuracy
- computational cost
- edge detection
- mutual information
- medical images
- optimization algorithm
- cost function
- objective function