Engineering & Materials Science
Hardware security
100%
Intellectual property
82%
Computer hardware
81%
Biochips
62%
Integrated circuits
57%
Cryptography
51%
Authentication
51%
Error detection
50%
Networks (circuits)
46%
Side channel attack
38%
High level synthesis
37%
Watermarking
36%
Image compression
35%
Digital microfluidics
33%
Costs
33%
Reverse engineering
33%
Security of data
29%
System-on-chip
28%
Testing
28%
Redundancy
26%
Supply chains
25%
Steganography
25%
Memristors
25%
Data storage equipment
25%
Foundries
25%
Biometrics
23%
Hash functions
22%
Pixels
21%
Machine learning
20%
Cameras
19%
Microfluidics
18%
Computer aided design
18%
Nanoelectronics
18%
Field programmable gate arrays (FPGA)
17%
Intellectual property core
17%
Sensors
16%
Classifiers
16%
Assays
15%
Bioassay
14%
Neural networks
14%
Design for testability
14%
Integrated circuit design
14%
Degradation
14%
Industry
14%
Color
13%
Image coding
13%
Observability
13%
Fabrication
13%
Network protocols
13%
Application specific integrated circuits
13%
Compaction
13%
Experiments
12%
Semiconductor materials
12%
Recovery
12%
Digital forensics
12%
Aging of materials
12%
Logic gates
11%
Transistors
11%
Deep learning
10%
VLSI circuits
10%
Flip flop circuits
10%
Pipelines
10%
Monitoring
10%
Glossaries
10%
Scheduling
10%
Entropy
9%
Embedded systems
9%
Switches
9%
Defects
8%
Outsourcing
8%
Deep neural networks
8%
Detectors
8%
Digital watermarking
7%
Imaging techniques
7%
Electric power utilization
7%
Scanning
7%
NEMS
7%
Internet of things
7%
Digital cameras
7%
Electronic mail
7%
Spin Hall effect
7%
Electronic equipment
7%
Data compression
7%
Logic circuits
7%
Signal processing
6%
Energy dissipation
6%
Hamming distance
6%
Clocks
6%
Set theory
6%
Silicon
6%
Digital circuits
6%
Taxonomies
6%
Built-in self test
6%
Bandwidth
6%
Circuit theory
6%
Particle accelerators
6%
Mathematics
Attack
35%
Hardware
23%
Locking
19%
Design
19%
Intellectual Property
18%
Steganalysis
12%
Steganography
11%
Integrated Circuits
11%
Biometrics
11%
Chip
10%
Lossless Compression
9%
High-level Synthesis
9%
Compression
9%
Microfluidics
9%
Logic
9%
Countermeasures
9%
Authentication
8%
Error Detection
7%
Cryptanalysis
7%
Manufacturing
6%
Fingerprint
6%
Performance
6%
Obfuscation
6%
Costs
6%
Machine Learning
6%
Concurrent
5%
Template
5%
Encryption
5%