Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
MeMin: SAT-based exact minimization of incompletely specified Mealy machines
In this paper, we take a fresh look at a well-known NP-complete problem-the exact
minimization of incompletely specified Mealy machines. Most existing exact techniques in …
minimization of incompletely specified Mealy machines. Most existing exact techniques in …
Automatic generation of models of microarchitectures
A Abel - 2020 - publikationen.sulb.uni-saarland.de
Detailed microarchitectural models are necessary to predict, explain, or optimize the
performance of software running on modern microprocessors. Building such models often …
performance of software running on modern microprocessors. Building such models often …
Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification
As the reuse of IP cores or the development of frequently used hardware modules is gaining
more attention in the semiconductor industry, the misappropriation of the owner's identity is a …
more attention in the semiconductor industry, the misappropriation of the owner's identity is a …
[HTML][HTML] Hausdorff distance model-based identity authentication for IP circuits in service-centric internet-of-things environment
Rapid advances in the Internet-of-Things (IoT) have exposed the underlying hardware
devices to security threats. As the major component of hardware devices, the integrated …
devices to security threats. As the major component of hardware devices, the integrated …
A novel identity authentication for FPGA based IP designs
Y Huang, W Liang, J Long, J Xu… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
With the rapid development of Internet-of-Things (IoT), hardware security becomes an
important issue. Once a chip is attacked, the authentication always faces serious credibility …
important issue. Once a chip is attacked, the authentication always faces serious credibility …
A Darwinian genetic algorithm for state encoding based finite state machine watermarking
M Lewandowski, S Katkoori - 20th International Symposium on …, 2019 - ieeexplore.ieee.org
We propose an extended Darwinian Genetic Algorithm that builds upon the traditional
genetic algorithm in the efforts to more accurately depict the process of natural selection We …
genetic algorithm in the efforts to more accurately depict the process of natural selection We …
IP-cores watermarking scheme at behavioral level using genetic algorithms
This paper presents an improved watermarking scheme for soft Intellectual Property (IP)-
Cores using Genetic Algorithms (GAs). For this purpose, a watermark signature and an IP …
Cores using Genetic Algorithms (GAs). For this purpose, a watermark signature and an IP …
[KNIHA][B] Secure VLSI Hardware Design against Intellectual Property (IP) Theft and Cryptographic Vulnerabilities
MD Lewandowski - 2021 - search.proquest.com
Over the last two decades or so, VLSI hardware is increasingly subject to sophisticated
attacks on both the supply chain and design fronts. There is no explicit trust that the …
attacks on both the supply chain and design fronts. There is no explicit trust that the …
Implementation-based design fingerprinting for robust IC fraud detection
With the global spanning of integrated circuit (IC) and electronic device supply chains, the
ability of an untrusted foundry to alter a design for intellectual property (IP)/IC piracy …
ability of an untrusted foundry to alter a design for intellectual property (IP)/IC piracy …
[PDF][PDF] A Novel Identity Authentication for FPGA based IP Designs
WL Yin Huang, J Long, J Xu, KC Li - researchgate.net
(IoT), hardware security becomes an important issue. Once a chip is attacked, the
authentication always faces serious credibility crisis. In this work, a Hausdorff distance …
authentication always faces serious credibility crisis. In this work, a Hausdorff distance …