Articles with "trojan" as a keyword



Piezocatalytic Schottky Junction Treats Atherosclerosis by a Biomimetic Trojan Horse Strategy

Sign Up to like & get
recommendations!
Published in 2024 at "Advanced Materials"

DOI: 10.1002/adma.202312102

Abstract: The atherosclerotic vulnerable plaque is characterized by the foamy macrophage burden, involving impaired cholesterol efflux and deficient efferocytosis. Correspondingly, piezocatalytic therapy is an emerging solution for eliminating the foamy macrophage burden with satisfactory spatiotemporal controllability… read more here.

Keywords: biomimetic trojan; horse strategy; schottky junction; trojan horse ... See more keywords

Toward FPGA Security in IoT: A New Detection Technique for Hardware Trojans

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2019.2914079

Abstract: Nowadays, field programmable gate array (FPGA) has been widely used in Internet of Things (IoT) since it can provide flexible and scalable solutions to various IoT requirements. Meanwhile, hardware Trojan (HT), which may lead to… read more here.

Keywords: fpga security; security; security iot; trojan ... See more keywords

Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection Technique

Sign Up to like & get
recommendations!
Published in 2024 at "Micromachines"

DOI: 10.3390/mi15010149

Abstract: Convolutional neural networks (CNNs) have demonstrated significant superiority in modern artificial intelligence (AI) applications. To accelerate the inference process of CNNs, reconfigurable CNN accelerators that support diverse networks are widely employed for AI systems. Given… read more here.

Keywords: cnn accelerators; hardware trojan; network; trojan ... See more keywords