Search

Your search keyword '"Netlist"' showing total 452 results

Search Constraints

Start Over You searched for: Descriptor "Netlist" Remove constraint Descriptor: "Netlist" Topic computer Remove constraint Topic: computer
452 results on '"Netlist"'

Search Results

1. ObfusX: Routing obfuscation with explanatory analysis of a machine learning attack

2. A Clock Tree Prediction and Optimization Framework Using Generative Adversarial Learning

3. GNN-RE: Graph Neural Networks for Reverse Engineering of Gate-Level Netlists

4. Privacy-Preserving IP Verification

5. A Novel Algorithm for Hardware Trojan Detection Through Reverse Engineering

6. Concerted Wire Lifting: Enabling Secure and Cost-Effective Split Manufacturing

7. Robust Deep Learning for IC Test Problems

8. Thwarting All Logic Locking Attacks: Dishonest Oracle With Truly Random Logic Locking

9. AxLS: A Framework for Approximate Logic Synthesis Based on Netlist Transformations

10. PhaseCamouflage: Leveraging Adiabatic Operation to Thwart Reverse Engineering

11. FPGA Accelerator for Real-Time Emulation of Power Electronic Systems Using Multiport Decomposition

12. Graph-based STA for asynchronous controllers

13. A cellular automata guided two level obfuscation of Finite-State-Machine for IP protection

14. The SAT Attack on IC Camouflaging: Impact and Potential Countermeasures

15. Improving FPGA-Based Logic Emulation Systems through Machine Learning

16. An Automatic Placement and Routing Methodology for Asynchronous SFQ Circuit Design

17. In-FPGA Instrumentation Framework for OpenCL-Based Designs

18. Lockit: A Logic Locking Automation Software

19. Machine Learning Approach for Accelerating Simulation-based Fault Injection

20. Deep Learning-based Hardware Trojan Detection with Block-based Netlist Information Extraction

21. Logic Obfuscation Technique for Securing Test Pattern Generators

22. Koios: A Deep Learning Benchmark Suite for FPGA Architecture and CAD Research

23. Efficient Hardware Trojan Detection Using Generic Feature Extraction and Weighted Ensemble Method

24. Hardware Trojan Detection using Supervised Machine Learning

25. Design and synthesis of Karatsuba multiplier using Square root carry select adder (SRCSA)

26. RTL to GDSII implementation of Advanced High-Performance Bus Lite

27. Physical Implementation of Square-Root-Carry-Select-Adder

28. Data Augmentation for Machine Learning-Based Hardware Trojan Detection at Gate-Level Netlists

29. HAL—The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion

30. Defeating Silicon Reverse Engineering Using a Layout-Level Standard Cell Camouflage

31. A Fabric IP Netlist Generator for a Compiler-Approach to Fabric Integration

32. Design of the RRAM-Based Polymorphic Look-Up Table Scheme

33. A Comprehensive FPGA Reverse Engineering Tool-Chain: From Bitstream to RTL Code

34. Open-Source Memory Compiler for Automatic RRAM Generation and Verification

35. Hardware Trojan Detection Method for Inspecting Integrated Circuits Based on Machine Learning

36. Reliability Analysis in Less than 200 Lines of Code

37. Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs

38. Machine Learning Framework for Early Routability Prediction with Artificial Netlist Generator

39. Towards Compositional Abstraction of Analog Neuronal Networks

40. Automatic Surrogate Model Generation and Debugging of Analog/Mixed-Signal Designs Via Collaborative Stimulus Generation and Machine Learning

41. A novel standard-cell-based implementation of the digital ota suitable for automatic place and route

42. FUNCODE: Effective Device-to-System Analysis of Field Coupled Nanocomputing Circuit Designs

43. Increasing Side-Channel Resistance by Netlist Randomization and FPGA-Based Reconfiguration

44. Radio Frequency Amplifier Design Examples and Performance Optimization with SPICE and Load and Source Pull Schemes

45. Design for Trust Using Transition Probability

46. ReCon: From the Bitstream to Piracy Detection

47. High Efficiency Early-Complete Brute Force Elimination Method for Security Analysis of Camouflage IC

48. ReGDS: A Reverse Engineering Framework from GDSII to Gate-level Netlist

49. The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes

50. Machine Learning Based Efficiency and Power Estimation of Circular Buffer

Catalog

Books, media, physical & digital resources