Hardware Dithering: A Run-Time Method for Trojan Neutralization in Wireless Cryptographic ICs.
Christiana KapatsoriYu LiuAngelos AntonopoulosYiorgos MakrisPublished in: ITC (2018)
Keyphrases
- experimental evaluation
- detection method
- preprocessing
- low cost
- computational cost
- pairwise
- cost function
- probabilistic model
- high precision
- wireless networks
- computer systems
- dynamic programming
- similarity measure
- high accuracy
- edge detection
- image compression
- significant improvement
- objective function
- neural network