Odetola, T. A., Mohammed, H. R., & Hasan, S. R. (Jan 27, 2021). A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA). arXiv.org.
Copiado correctamente al portapapeles
Error al copiar al portapapeles
Cita Chicago Style (17a ed.)
Odetola, Tolulope A., Hawzhin Raoof Mohammed, y Syed Rafay Hasan. "A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)."
ArXiv.org Jan 27, 2021.
Copiado correctamente al portapapeles
Error al copiar al portapapeles
Cita MLA (9a ed.)
Odetola, Tolulope A., et al. "A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)."
ArXiv.org, Jan 27, 2021.
Copiado correctamente al portapapeles
Error al copiar al portapapeles
警告:這些引文格式不一定是100%准確.