Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2017 2017
DOI: 10.23919/date.2017.7927244
|View full text |Cite
|
Sign up to set email alerts
|

An evolutionary approach to hardware encryption and Trojan-horse mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…-Adaptive Iterative Optimization Algorithm (AIOA) [74] is a model-enhancing technique in which a specific classifier is iteratively improved using the input training data weighted by a weight vector to reduce the errors. -Multi-Objective Evolutionary Algorithm (MOEA) [75] is an enhanced optimization algorithm that starts from randomly generated populations and then increasingly approaches the Pareto-optimal solutions by applying multiple-generation continuous optimization operations with adaptability. -Particle Swarm Optimization (PSO) Algorithm [104], [125] is an optimizer that attempts to find the optimal solution through the cooperation and information sharing among individuals in a group.…”
Section: ) Design Optimization and Model Enhancementmentioning
confidence: 99%
See 4 more Smart Citations
“…-Adaptive Iterative Optimization Algorithm (AIOA) [74] is a model-enhancing technique in which a specific classifier is iteratively improved using the input training data weighted by a weight vector to reduce the errors. -Multi-Objective Evolutionary Algorithm (MOEA) [75] is an enhanced optimization algorithm that starts from randomly generated populations and then increasingly approaches the Pareto-optimal solutions by applying multiple-generation continuous optimization operations with adaptability. -Particle Swarm Optimization (PSO) Algorithm [104], [125] is an optimizer that attempts to find the optimal solution through the cooperation and information sharing among individuals in a group.…”
Section: ) Design Optimization and Model Enhancementmentioning
confidence: 99%
“…10. To this end, Andrea et al introduced a MOEA-based obfuscation design strategy that can explicitly reduce the rare signals and maximize the efficiency of logic encryption to effectively mitigate the threats of HT attacks and overproduction [75]. However, such a technique is only suitable for small combinational circuits.…”
Section: -Implantation Preventionmentioning
confidence: 99%
See 3 more Smart Citations