Login / Signup
Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing.
Pravin Gaikwad
Jonathan Cruz
Prabuddha Chakraborty
Swarup Bhunia
Tamzidul Hoque
Published in:
ACM J. Emerg. Technol. Comput. Syst. (2023)
Keyphrases
</>
post processing
machine learning
preprocessing
dct domain
watermarking scheme
traffic analysis
knowledge acquisition
filtering method
human experts
data analysis
feature selection
text mining
information security
support vector machine
knowledge discovery
learning algorithm
digital images
data mining process