Login / Signup
Practical methods for verifying removal of Trojan stable operating points.
Yen-Ting Wang
Degang Chen
Randall L. Geiger
Published in:
ISCAS (2013)
Keyphrases
</>
machine learning methods
preprocessing
significant improvement
point sets
practical problems
data sets
computational cost
data mining techniques
feature points
benchmark datasets
search methods