Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 93 matches
- 2024
- Zijian Li, Bingbing Zheng, Chengxian Zhang, Zhenrong Zhang, Hong-Bo Xie, Kejin Wei:
Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution. Quantum Inf. Process. 23(2): 40 (2024) - 2023
- Rama Devi Maddineni, Deepak Ch:
Consistent Interpretation of Ensemble Classifiers in Trojan-Horse Detection. IEEE Access 11: 70930-70946 (2023) - Journal of Robotics:
Retracted: Research on Clue Mining in Criminal Cases of Smart Phone Trojan Horse under the Background of Information Security. J. Robotics 2023: 9785409:1-9785409:1 (2023) - Alessandro Palumbo, Luca Cassano, Pedro Reviriego, Marco Ottavi:
Improving the Detection of Hardware Trojan Horses in Microprocessors via Hamming Codes. DFT 2023: 1-6 - Alessandro Palumbo, Marco Ottavi, Luca Cassano:
Built-in Software Obfuscation for Protecting Microprocessors against Hardware Trojan Horses. DFT 2023: 1-6 - Fan Hu, Aozhu Chen, Xirong Li:
Towards Making a Trojan-Horse Attack on Text-to-Image Retrieval. ICASSP 2023: 1-5 - Zhuoshi Pan, Yuguang Yao, Gaowen Liu, Bingquan Shen, H. Vicky Zhao, Ramana Rao Kompella, Sijia Liu:
From Trojan Horses to Castle Walls: Unveiling Bilateral Backdoor Effects in Diffusion Models. CoRR abs/2311.02373 (2023) - 2022
- Nitesh Bharosa:
The rise of GovTech: Trojan horse or blessing in disguise? A research agenda. Gov. Inf. Q. 39(3): 101692 (2022) - Hasan Kanaker, Nader Abdel Karim, Samer A. B. Awwad, Nurul Halimatul Asmak Ismail, Jamal Zraqou, Abdulla M. F. Al ali:
Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning. Int. J. Interact. Mob. Technol. 16(24): 81-106 (2022) - Luca Cassano, Mattia Iamundo, Tomas Antonio Lopez, Alessandro Nazzari, Giorgio Di Natale:
DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN. J. Syst. Archit. 129: 102592 (2022) - Fan Hu, Aozhu Chen, Xirong Li:
Targeted Trojan-Horse Attacks on Language-based Image Retrieval. CoRR abs/2202.03861 (2022) - Arezoo Rajabi, Bhaskar Ramasubramanian, Radha Poovendran:
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning. CoRR abs/2203.15506 (2022) - (Withdrawn) Research on Clue Mining in Criminal Cases of Smart Phone Trojan Horse under the Background of Information Security. J. Robotics 2022: 7568110:1-7568110:11 (2022)
- 2021
- Tapobrata Dhar, Surajit Kumar Roy, Chandan Giri:
Hardware Trojan Horse Detection through Improved Switching of Dormant Nets. ACM J. Emerg. Technol. Comput. Syst. 17(3): 33:1-33:22 (2021) - Gonçalo Falcão, José Beirão:
Building a Trojan Horse: Third Phase in the Experiment/Research with City Information Modeling (CIM) and the Design Ethics. AHFE (4) 2021: 28-34 - Alessandro Palumbo, Luca Cassano, Pedro Reviriego, Giuseppe Bianchi, Marco Ottavi:
A Lightweight Security Checking Module to Protect Microprocessors against Hardware Trojan Horses. DFT 2021: 1-6 - Gonçalo Falcão, José Beirão:
Testing a Trojan Horse: Fifth Step in the Experiment/Research with City Information Modelling (CIM) and the Design Ethics. IHIET (Strasbourg) 2021: 273-279 - 2020
- Roberto Dell'Anno, Rocco Caferra, Andrea Morone:
A "Trojan Horse" in the peer-review process of fee-charging economic journals. J. Informetrics 14(3): 101052 (2020) - Maha Shatta, Ihab Adly, Hassanein H. Amer, Gehad I. Alkady, Ramez M. Daoud, Sahar Hamed, Shahenda Hatem:
FPGA-based Architectures to Recover from Hardware Trojan Horses, Single Event Upsets and Hard Failures. ICM 2020: 1-4 - Chuan Guo, Ruihan Wu, Kilian Q. Weinberger:
TrojanNet: Embedding Hidden Trojan Horse Models in Neural Networks. CoRR abs/2002.10078 (2020) - Jun Gu, Tzonelih Hwang:
On the lightweight authenticated semi-quantum key distribution protocol without Trojan horse attack. CoRR abs/2010.10236 (2020) - 2018
- Alexey Stakhov:
Mission-Critical Systems, Paradox of Hamming Code, Row Hammer Effect, 'Trojan Horse' of the Binary System and Numeral Systems with Irrational Bases. Comput. J. 61(7): 1038-1063 (2018) - Soheil Jamshidi, Reza Rejaie, Jun Li:
Trojan Horses in Amazon's Castle: Understanding the Incentivized Online Reviews. ASONAM 2018: 335-342 - Naghmeh Karimi, Jean-Luc Danger, Sylvain Guilley:
On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis. IOLTS 2018: 281-286 - Sivappriya Manivannan, N. Nalla Anandakumar, M. Nirmala Devi:
Key Retrieval from AES Architecture Through Hardware Trojan Horse. SSCC 2018: 483-494 - 2017
- Rajat Subhra Chakraborty, Samuel Pagliarini, Jimson Mathew, Sree Ranjani Rajendran, M. Nirmala Devi:
A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis. IEEE Trans. Emerg. Top. Comput. 5(2): 260-270 (2017) - Andrea Marcelli, Marco Restifo, Ernesto Sánchez, Giovanni Squillero:
An evolutionary approach to hardware encryption and Trojan-horse mitigation. DATE 2017: 1593-1598 - Krishna Bagadia, Urbi Chatterjee, Debapriya Basu Roy, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:
Exploiting safe error based leakage of RFID authentication protocol using hardware Trojan horse. HOST 2017: 167 - Bum Jun Kwon, Virinchi Srinivas, Amol Deshpande, Tudor Dumitras:
Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns. NDSS 2017 - 2016
- Karen Levy, David Merritt Johns:
When open data is a Trojan Horse: The weaponization of transparency in science and governance. Big Data Soc. 3(1): 205395171562156 (2016)
skipping 63 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 22:47 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint