Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secured convolutional layer IP core in convolutional neural network using facial biometric
This paper presents a novel methodology to design a secured custom reusable intellectual
property (IP) core for the convolutional layer of convolutional neural network (CNN). Since …
property (IP) core for the convolutional layer of convolutional neural network (CNN). Since …
Securing IP cores for DSP applications using structural obfuscation and chromosomal DNA impression
This paper presents a novel hybrid methodology with structural obfuscation and encrypted
chromosomal DNA impression to secure intellectual property (IP) cores of digital signal …
chromosomal DNA impression to secure intellectual property (IP) cores of digital signal …
Hardware Security of Digital Image Filter IP Cores against Piracy using IP Seller's Fingerprint Encrypted Amino Acid Biometric Sample
Security of important hardware accelerators such as digital image filter IP cores has become
a primary concern owing to its wide applicability in modern consumer electronics …
a primary concern owing to its wide applicability in modern consumer electronics …
Revolutionizing Data Capitalization: Harnessing Blockchain for IoT-Enabled Smart Contracts
The use of blockchain smart contracts in the monetization of IoT data assets addresses
challenges in personal data ownership, quantifiable tracking of data assets, and efficient …
challenges in personal data ownership, quantifiable tracking of data assets, and efficient …
Securing reusable ip cores using voice biometric based watermark
Reusable third-party intellectual property (3PIP) cores within the supply chain are vulnerable
to hardware threats such as IP piracy and false claim of ownership. Securing the reusable IP …
to hardware threats such as IP piracy and false claim of ownership. Securing the reusable IP …
Exploring handwritten signature image features for hardware security
This paper presents a novel hardware security technique that leverages handwritten
signature image features for securing intellectual property (IP) cores, such as digital signal …
signature image features for securing intellectual property (IP) cores, such as digital signal …
Watermarking Hardware IPs Using Design Parameter Driven Encrypted Dispersion Matrix With Eigen Decomposition Based Security Framework
In the present era of the global design supply chain, several untrustworthy entities can be
involved. From an intellectual property (IP) vendor's perspective, an attacker in the system …
involved. From an intellectual property (IP) vendor's perspective, an attacker in the system …
Retinal biometric for securing JPEG-codec hardware IP core for CE systems
Fake/pirated hardware intellectual property (IP) cores integrated in consumer electronics
systems can cause reliability hazards and jeopardize the safety of end consumer. Robust …
systems can cause reliability hazards and jeopardize the safety of end consumer. Robust …
Robust security of hardware accelerators using protein molecular biometric signature and facial biometric encryption key
This article proposes a robust encrypted protein molecular biometric signature-based
hardware security approach to secure hardware accelerators (like digital signal processing …
hardware security approach to secure hardware accelerators (like digital signal processing …
Secure hardware IP of GLRT cascade using color interval graph based embedded fingerprint for ECG detector
This paper presents a security aware design methodology to design secure generalized
likelihood ratio test (GLRT) hardware intellectual property (IP) core for electrocardiogram …
likelihood ratio test (GLRT) hardware intellectual property (IP) core for electrocardiogram …