You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thank you for your detailed and well-ordered review.
The subject of your work is unfamiliar to me but it is quite good to understand and get the gist of paper.
I have some questions & suggestion about your review below.
In motivation section, you mentioned that "Trojans in IC and PCB can make the devices vulnerable to adversarial attacks". What kinds of adversarial attacks can be done?? To my knowledge, the adversarial attack is to perturb the output of model by injecting some noises. So I wonder what kinds of attacks can be applied to hidden modifications(Trojans) in harware.
I suggest you to provide more detailed explanation of method. What is the meaning of 'libraries' in method section that is used to extract about 10,000 standard cells? And there are many technical terms in that sections which are quite hard to understand. I recommend you to provide some additional explanations or revise with understandable terminology.
Thank you!
The text was updated successfully, but these errors were encountered:
Thank you for your interesting and detailed review.
I didn't know much about hardware assurance, but I read your review and thought it was a very interesting topic.
Your review was written in an easy-to-understand manner, even though it was an unfamiliar field.
However, it would have been better if the methodology of the paper was explained in detail using images in the method section.
In addition, it would be better if you could interpret the results of Table 4 in more detail.
Thank you for your detailed and well-ordered review.
The subject of your work is unfamiliar to me but it is quite good to understand and get the gist of paper.
I have some questions & suggestion about your review below.
Thank you!
The text was updated successfully, but these errors were encountered: