Cita APA (7a ed.)
Odetola, T. A., Mohammed, H. R., & Hasan, S. R. (Jan 27, 2021). A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA). arXiv.org.
Cita Chicago Style (17a ed.)
Odetola, Tolulope A., Hawzhin Raoof Mohammed, y Syed Rafay Hasan. "A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)." ArXiv.org Jan 27, 2021.
Cita MLA (9a ed.)
Odetola, Tolulope A., et al. "A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)." ArXiv.org, Jan 27, 2021.
警告:這些引文格式不一定是100%准確.