计算机与控制工程 |
|
|
|
|
基于遗传算法的少态节点活性提升方法 |
刘尚典1,2( ),赵毅强1,2,*( ),刘燕江1,2,何家骥1,2,原义栋1,3,于艳艳3 |
1. 天津大学 微电子学院,天津 300072 2. 天津大学 天津市成像与感知微电子技术重点实验室,天津 300072 3. 北京智芯微电子科技有限公司 北京市电力高可靠性集成电路设计工程技术研究中心,北京 100192 |
|
A rare node activity improvement method based on genetic algorithm |
Shang-dian LIU1,2( ),Yi-qiang ZHAO1,2,*( ),Yan-jiang LIU1,2,Jia-ji HE1,2,Yi-dong YUAN1,3,Yan-yan YU3 |
1. School of Microelectronics, Tianjin University, Tianjin 300072, China 2. Tianjin Key Laboratory of Imaging and Sensing Microelectronic Technology, Tianjin University, Tianjin 300072, China 3. Beijing Engineering Research Center of High-reliability IC with Power Industrial Grade, Beijing Smart-Chip Microelectronics Technology Co. Ltd, Beijing 100192, China |
引用本文:
刘尚典,赵毅强,刘燕江,何家骥,原义栋,于艳艳. 基于遗传算法的少态节点活性提升方法[J]. 浙江大学学报(工学版), 2019, 53(8): 1546-1551.
Shang-dian LIU,Yi-qiang ZHAO,Yan-jiang LIU,Jia-ji HE,Yi-dong YUAN,Yan-yan YU. A rare node activity improvement method based on genetic algorithm. Journal of ZheJiang University (Engineering Science), 2019, 53(8): 1546-1551.
链接本文:
http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2019.08.013
或
http://www.zjujournals.com/eng/CN/Y2019/V53/I8/1546
|
1 |
AGRAWAL D, BAKTIR S, KARAKOYUNLU D, et al. Trojan detection using IC fingerprinting [C]// IEEE Symposium on Security and Privacy. [S.l.]: IEEE, 2007: 296-310.
|
2 |
TEHRANIPOOR M, KOUSHANFAR F A survey of hardware Trojan taxonomy and detection[J]. IEEE Design and Test of Computers, 2010, 27 (1): 10- 25
doi: 10.1109/MDT.2010.7
|
3 |
BHUNIA S, HSIAO M S, BANGA M, et al Hardware Trojan attacks: threat analysis and countermeasures[J]. Proceedings of the IEEE, 2014, 102 (8): 1229- 1247
doi: 10.1109/JPROC.2014.2334493
|
4 |
SAAD W, SANJAB A, WANG Y, et al Hardware Trojan detection game: a prospect-theoretic approach[J]. IEEE Transactions on Vehicular Technology, 2017, 66 (9): 7697- 7710
doi: 10.1109/TVT.2017.2686853
|
5 |
JACOB N, MERLI D, HEYSZL J, et al Hardware Trojans: current challenges and approaches[J]. IET Computers and Digital Techniques, 2014, 8 (6): 264- 273
doi: 10.1049/iet-cdt.2014.0039
|
6 |
CHAKRABORTY R S, PAGLIARINI S, MATHEW J, et al A flexible online checking technique to enhance hardware Trojan horse detectability by reliability analysis[J]. IEEE Transactions on Emerging Topics in Computing, 2017, 5 (2): 260- 270
|
7 |
CHAKRABORTY R S, WOLFF F, PAUL S, et al. MERO: a statistical approach for hardware Trojan detection [C]// International Workshop on Cryptographic Hardware and Embedded Systems. Berlin : Springer, 2009: 396-410.
|
8 |
WANG S J, WEI J Y, HUANG S H, et al. Test gene-ration for combinational hardware Trojans [C]// Hardware-Oriented Security and Trust. [S.l.]: IEEE, 2016: 1-6.
|
9 |
XUE M, HU A, LI G. Detecting hardware Trojan through heuristic partition and activity driven test pattern generation [C]// Communications Security Conference. [S.l.]: IET, 2014: 1-6.
|
10 |
YE X, FENG J, GONG H, et al. An anti-Trojans design approach based on activation probability analysis [C]// Electron Devices and Solid-state Circuits. [S.l.]: IEEE, 2015: 443-446.
|
11 |
HAN C, WANG L, ZHANG Z, et al A multi-objective genetic algorithm based on fitting and interpolation[J]. IEEE Access, 2018, 6: 22920- 22929
doi: 10.1109/ACCESS.2018.2829262
|
12 |
MICHALEWICZ Z A non-standard genetic algorithm for the nonlinear transportation problem[J]. Informs Journal on Computing, 2017, 3 (4): 307- 316
|
13 |
LIN C T, PRASAD M, SAXENA A An improved polynomial neural network classifier using real-coded genetic algorithm[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2017, 45 (11): 1389- 1401
|
14 |
MASMOUDI M A, BRAEKERS K, MASMOUDI M, et al A hybrid genetic algorithm for the heterogeneous dial-a-ride problem[J]. Computers and Operations Research, 2017, 81: 1- 13
|
15 |
FRIEDRICH T, K?TZING T, KREJCA M S, et al The compact genetic algorithm is efficient under extreme Gaussian noise[J]. IEEE Transactions on Evolutionary Computation, 2017, 21 (3): 477- 490
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|