Hardware Trojan Detection Using Machine Learning: A Tutorial.
Kevin Immanuel GubbiBanafsheh Saber LatibariAnirudh SrikanthTyler SheavesSayed Arash Beheshti-ShiraziSai Manoj PDSetareh RafatiradAvesta SasanHouman HomayounSoheil SalehiPublished in: ACM Trans. Embed. Comput. Syst. (2023)
Keyphrases
- machine learning
- application of machine learning methods
- false alarms
- automatic detection
- pattern recognition
- detection accuracy
- learning algorithm
- machine learning algorithms
- object detection
- detection algorithm
- real time
- knowledge acquisition
- detection rate
- false positives
- detection method
- text mining
- computer systems
- hardware and software
- computer vision
- learning problems
- data mining
- computing power
- information retrieval
- artificial intelligence
- embedded systems
- feature selection
- text classification
- data acquisition
- data analysis
- knowledge representation
- information extraction
- model selection
- low cost