On the Limitations of Obfuscating Redundant Circuits in Frustrating Hardware Trojan Implantation | 0 | 0.34 | 2021 |
Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores | 0 | 0.34 | 2021 |
Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles | 1 | 0.37 | 2020 |