Hardware trojan detection using power signal foot prints in frequency domain

V Maruthi, K Balamurugan… - … on Communication and …, 2020 - ieeexplore.ieee.org
This work proposes a plausible detection scheme for Hardware Trojan (HT) detection in
frequency domain analysis. Due to shrinking technology every node consumes low power …

Hardware Trojan detection using XGBoost algorithm for IoT with data augmentation using CTGAN and SMOTE

CGP Srinivas, S Balachander… - … and Network Computing …, 2021 - Springer
Internet of things is the next blooming field in engineering. Seamless connectivity has
become the new normal when devices are manufactured. This demand for IoT (Internet of …

Genetic algorithm based hardware trojan detection

CS Sruthi, M Lohitha, SK Sriniketh… - 2021 7th …, 2021 - ieeexplore.ieee.org
There is an increasing concern about possible hostile modification done to ICs, which are
used in various critical applications. Such malicious modifications are referred to as …

Analysis of the visualizing changes in radar time series using the REACTIV method through satellite imagery

HS Hamid, RF Chisab - International Journal of Electrical and …, 2022 - search.proquest.com
A visualizing temporal stack of synthetic aperture radar (SAR) images are presented in this
work, the method is called REACTIV, which enabled us to highlight color zones that have …

Performance enhancement by tuning hyperparameters of random forest classifier for hardware Trojan detection

MN Reddy, MR Latchmana Kumar, PBS Kumar… - … Conference on Data …, 2022 - Springer
Security threats are a huge concern in our world as technology advances every day. As the
proliferation of IoT devices is observable across a wide range of applications, it becomes …

[PDF][PDF] An Optimal Feature Extraction using Deep Learning Technique for Trojan Detection and Validation using Game Theory.

P Murugesan, ND Manickam - … Journal of Intelligent Engineering & Systems, 2020 - inass.org
In modern electronic design, hardware Trojan has emerged as a major threat in the
hardware security. To detect the hardware Trojan is a major problem in testing process …

The Effect of Overlap Value and Grid Coefficient on Yang Method: Super-Resolution Image Reconstruction Using Random Raw Patches

RD Atmaja, AB Suksmono - 2020 FORTEI-International …, 2020 - ieeexplore.ieee.org
Super-resolution images are often needed in computer vision applications because having
high pixel density can provide more detailed information. Super-resolution images can be …