Leveraging gem5 for Hardware Trojan Research: Simulation for Machine-Learning-Based Detection | Publicación