An exquisitely sensitive variant-conscious post-silicon Hardware Trojan detection.
Fakir Sharif HossainTomokazo YunedaPublished in: Integr. (2023)
Keyphrases
- low cost
- real time
- detection accuracy
- false positives
- neural network
- hardware and software
- detection method
- anomaly detection
- object detection
- detection algorithm
- high speed
- event detection
- detection rate
- automatic detection
- image processing
- vlsi implementation
- data acquisition
- embedded systems
- false alarms
- computing systems
- data mining