UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 287.888
11.
  • Optimizing the Convolution ... Optimizing the Convolution Operation to Accelerate Deep Neural Networks on FPGA
    Ma, Yufei; Cao, Yu; Vrudhula, Sarma ... IEEE transactions on very large scale integration (VLSI) systems, 07/2018, Letnik: 26, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    As convolution contributes most operations in convolutional neural network (CNN), the convolution acceleration scheme significantly affects the efficiency and performance of a hardware CNN ...
Celotno besedilo

PDF
12.
Celotno besedilo

PDF
13.
  • Hardware Trojan Attacks: Th... Hardware Trojan Attacks: Threat Analysis and Countermeasures
    Bhunia, Swarup; Hsiao, Michael S.; Banga, Mainak ... Proceedings of the IEEE, 08/2014, Letnik: 102, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Security of a computer system has been traditionally related to the security of the software or the information being processed. The underlying hardware used for information processing has been ...
Celotno besedilo
14.
  • Hardware Trojan Detection b... Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
    Narasimhan, Seetharam; Dongdong Du; Chakraborty, Rajat Subhra ... IEEE transactions on computers, 11/2013, Letnik: 62, Številka: 11
    Journal Article
    Recenzirano

    Hardware Trojan attack in the form of malicious modification of a design has emerged as a major security threat. Sidechannel analysis has been investigated as an alternative to conventional logic ...
Celotno besedilo
15.
  • A survey of hardware Trojan... A survey of hardware Trojan threat and defense
    Li, He; Liu, Qiang; Zhang, Jiliang Integration (Amsterdam), September 2016, 2016-09-00, Letnik: 55
    Journal Article
    Recenzirano

    Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with various means to steal the internal sensitive data or modify original functionality, which may lead to huge economic ...
Celotno besedilo
16.
  • Ten years of hardware Troja... Ten years of hardware Trojans: a survey from the attacker's perspective
    Xue, Mingfu; Gu, Chongyan; Liu, Weiqiang ... IET computers & digital techniques, November 2020, Letnik: 14, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    Hardware Trojan detection techniques have been studied extensively. However, to develop reliable and effective defenses, it is important to figure out how hardware Trojans are implemented in ...
Celotno besedilo

PDF
17.
  • Anti-SAT: Mitigating SAT At... Anti-SAT: Mitigating SAT Attack on Logic Locking
    Xie, Yang; Srivastava, Ankur IEEE transactions on computer-aided design of integrated circuits and systems, 02/2019, Letnik: 38, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Logic locking is a technique that is proposed to protect outsourced IC designs from piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality only when a ...
Celotno besedilo

PDF
18.
  • On Reverse Engineering-Base... On Reverse Engineering-Based Hardware Trojan Detection
    Chongxi Bao; Forte, Domenic; Srivastava, Ankur IEEE transactions on computer-aided design of integrated circuits and systems, 2016-Jan., 2016-1-00, 20160101, Letnik: 35, Številka: 1
    Journal Article
    Recenzirano

    Due to design and fabrication outsourcing to foundries, the problem of malicious modifications to integrated circuits (ICs), also known as hardware Trojans (HTs), has attracted attention in academia ...
Celotno besedilo
19.
Celotno besedilo

PDF
20.
  • VeriTrust: Verification for... VeriTrust: Verification for Hardware Trust
    Jie Zhang; Feng Yuan; Linxiao Wei ... IEEE transactions on computer-aided design of integrated circuits and systems, 2015-July, 2015-7-00, 20150701, Letnik: 34, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Today's integrated circuit designs are vulnerable to a wide range of malicious alterations, namely hardware Trojans (HTs). HTs serve as backdoors to subvert or augment the normal operation of ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 287.888

Nalaganje filtrov