Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Zhengguang Tang"'
Autor:
Johann Knechtel, Mohammad Eslami, Peng Zou, Min Wei, Xingyu Tong, Binggang Qiu, Zhijie Cai, Guohao Chen, Benchao Zhu, Jiawei Li, Jun Yu, Jianli Chen, Chun-Wei Chiu, Min-Feng Hsieh, Chia-Hsiu Ou, Ting-Chi Wang, Bangqi Fu, Qijing Wang, Yang Sun, Qin Luo, Anthony W. H. Lau, Fangzhou Wang, Evangeline F. Y. Young, Shunyang Bi, Guangxin Guo, Haonan Wu, Zhengguang Tang, Hailong You, Cong Li, Ramesh Karri, Ozgur Sinanoglu, Samuel Pagliarini
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
Hardware Trojans (HTs) are a longstanding threat to secure computation. Among different threat models, it is the fabrication-time insertion of additional malicious logic directly into the layout of integrated circuits (ICs) that constitutes the most
Externí odkaz:
https://doaj.org/article/b700c80a6a7a45c8af54cd9278b80695
Autor:
Zhengguang Tang, Cong Li, Hailong You, Xingming Liu, Yu Wang, Yong Dai, Geng Bai, Xiaoling Lin
Publikováno v:
Micromachines, Vol 15, Iss 1, p 85 (2023)
With the CMOS technology downscaling to the deep nanoscale, the aging effects of devices degrade circuit performance and even lead to functional failure. The stress analysis is critical to evaluate the influence of aging effects on digital circuits.
Externí odkaz:
https://doaj.org/article/fb279d3b27c44b249550e47fcb9b79dd
Publikováno v:
Micromachines, Vol 14, Iss 6, p 1150 (2023)
With the rapid development of semiconductor technology, traditional equation-based modeling faces challenges in accuracy and development time. To overcome these limitations, neural network (NN)-based modeling methods have been proposed. However, the
Externí odkaz:
https://doaj.org/article/42104f63c2dc481aa94cddc497807cde
Publikováno v:
Integration. 83:67-76
Publikováno v:
Proceedings of the 28th Asia and South Pacific Design Automation Conference.
Publikováno v:
IEEE Transactions on Circuits and Systems II: Express Briefs. 68:2152-2156
To counteract logic-testing methods and trust verification methods for hardware Trojan (HT) detection, two HT design strategies based on high-low probability and partitioned combinational logic with a malicious reset signal are proposed. Using these
Publikováno v:
IEICE Electronics Express. 17:20200297-20200297
Publikováno v:
IEICE Electronics Express. 17:20200232-20200232
Publikováno v:
Bioresource Technology. 101:1097-1101
Activated carbons were prepared from sewage sludge by chemical activation. Pyrolusite was added as a catalyst during activation and carbonization. The influence of the mineral addition on the properties of the activated carbons produced was evaluated
Autor:
Zhengguang Tang1, Chen Liu1, Yao Chen1, Li Jiang1, Xiujuan Ji1, Wenju Jiang1 wenjujiang@scu.edu.cn
Publikováno v:
Fresenius Environmental Bulletin. 2010, Vol. 19 Issue 12a, p3000-3006. 7p. 1 Chart, 1 Graph.