These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
109 related articles for article (PubMed ID: 37421062)
1. Hardware Trojan Mitigation Technique in Network-on-Chip (NoC). Hussain M; Baloach NK; Ali G; ElAffendi M; Dhaou IB; Ullah SS; Uddin M Micromachines (Basel); 2023 Apr; 14(4):. PubMed ID: 37421062 [TBL] [Abstract][Full Text] [Related]
2. System-level protection and hardware Trojan detection using weighted voting. Amin HA; Alkabani Y; Selim GM J Adv Res; 2014 Jul; 5(4):499-505. PubMed ID: 25685518 [TBL] [Abstract][Full Text] [Related]
3. Hardware Trojans in Chips: A Survey for Detection and Prevention. Dong C; Xu Y; Liu X; Zhang F; He G; Chen Y Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32927772 [TBL] [Abstract][Full Text] [Related]
4. Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection Technique. Hou J; Liu Z; Yang Z; Yang C Micromachines (Basel); 2024 Jan; 15(1):. PubMed ID: 38276848 [TBL] [Abstract][Full Text] [Related]
5. A Viterbi decoder and its hardware Trojan models: an FPGA-based implementation study. Kakkara V; Balasubramanian K; Yamuna B; Mishra D; Lingasubramanian K; Murugan S PeerJ Comput Sci; 2020; 6():e250. PubMed ID: 33816902 [TBL] [Abstract][Full Text] [Related]
6. A Siamese deep learning framework for efficient hardware Trojan detection using power side-channel data. Nasr A; Mohamed K; Elshenawy A; Zaki M Sci Rep; 2024 Jun; 14(1):13013. PubMed ID: 38844523 [TBL] [Abstract][Full Text] [Related]
7. A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. Dong C; Yao Y; Xu Y; Liu X; Wang Y; Zhang H; Xu L Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420671 [TBL] [Abstract][Full Text] [Related]
8. Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs. Ali L; Farshad PLoS One; 2021; 16(7):e0254903. PubMed ID: 34324521 [TBL] [Abstract][Full Text] [Related]
9. Advancing interconnect density for spiking neural network hardware implementations using traffic-aware adaptive network-on-chip routers. Carrillo S; Harkin J; McDaid L; Pande S; Cawley S; McGinley B; Morgan F Neural Netw; 2012 Sep; 33():42-57. PubMed ID: 22561008 [TBL] [Abstract][Full Text] [Related]
10. Anticipative QoS Control: A Self-Reconfigurable On-Chip Communication. Tsai WC; Lin HE; Lan YC; Chen SJ Micromachines (Basel); 2022 Oct; 13(10):. PubMed ID: 36296022 [TBL] [Abstract][Full Text] [Related]
11. Hardware Trojans based on two-dimensional memtransistors. Wali A; Ravichandran H; Das S Nanoscale Horiz; 2023 May; 8(5):603-615. PubMed ID: 37021644 [TBL] [Abstract][Full Text] [Related]
12. Low Cost Interconnected Architecture for the Hardware Spiking Neural Networks. Luo Y; Wan L; Liu J; Harkin J; McDaid L; Cao Y; Ding X Front Neurosci; 2018; 12():857. PubMed ID: 30524230 [TBL] [Abstract][Full Text] [Related]
13. A Latency-Optimized Network-on-Chip with Rapid Bypass Channels. Ma W; Gao X; Gao Y; Yu N Micromachines (Basel); 2021 May; 12(6):. PubMed ID: 34072266 [TBL] [Abstract][Full Text] [Related]
14. Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems. Johnson AP; Al-Aqrabi H; Hill R Sensors (Basel); 2020 Feb; 20(3):. PubMed ID: 32033269 [TBL] [Abstract][Full Text] [Related]
15. A dual mode self-test for a stand alone AES core. Hossain FS; Sakib TH; Ashar M; Ferdian R PLoS One; 2021; 16(12):e0261431. PubMed ID: 34941912 [TBL] [Abstract][Full Text] [Related]
16. Maximizing the Inner Resilience of a Network-on-Chip through Router Controllers Design. Melo DR; Zeferino CA; Dilillo L; Bezerra EA Sensors (Basel); 2019 Dec; 19(24):. PubMed ID: 31835325 [TBL] [Abstract][Full Text] [Related]
17. Efficient design and analysis of secure CMOS logic through logic encryption. Chandra SS; Kannan RJ; Balaji BS; Veeramachaneni S; Noor Mahammad S Sci Rep; 2023 Jan; 13(1):1145. PubMed ID: 36670188 [TBL] [Abstract][Full Text] [Related]
18. Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance. An Z; Wang W; Li W; Li S; Zhang D Micromachines (Basel); 2023 Jul; 14(8):. PubMed ID: 37630061 [TBL] [Abstract][Full Text] [Related]