Transformers for Secure Hardware Systems: Applications, Challenges, and Outlook Authors: Banafsheh Saber Latibari, Najmeh Nazari, Avesta Sasan, Houman Homayoun, Pratik Satam, Soheil Salehi, Hossein Sayadi | Published: 2025-05-28 Security AnalysisHardware Trojan DetectionBackdoor Detection 2025.05.28 2025.05.30 Literature Database
Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing Authors: Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque | Published: 2021-11-29 Training Data GenerationHardware Trojan DetectionMachine Learning Algorithm 2021.11.29 2025.05.28 Literature Database