{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:13:05Z","timestamp":1742911985545,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030624620"},{"type":"electronic","value":"9783030624637"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62463-7_10","type":"book-chapter","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T09:06:23Z","timestamp":1604999183000},"page":"100-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Location Method for Reliability-Critical Paths Based on Monte Carlo Search Tree"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5992-6444","authenticated-orcid":false,"given":"Ziwen","family":"Sun","sequence":"first","affiliation":[]},{"given":"Qiou","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Zecheng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Aizhu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"issue":"7","key":"10_CR1","doi-asserted-by":"publisher","first-page":"35683","DOI":"10.1109\/ACCESS.2018.2845911","volume":"6","author":"J Xiao","year":"2018","unstructured":"Xiao, J., Jiang, J.H., Li, X.X., et al.: A novel trust evaluation method for logic circuits in IoT applications based on the E-PTM model. IEEE Access 6(7), 35683\u201335696 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"10_CR2","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1109\/TR.2016.2642168","volume":"66","author":"K Sridharan","year":"2017","unstructured":"Sridharan, K.: A transistor-level probabilistic approach for reliability analysis of arithmetic circuits with applications to emerging technologies. IEEE Trans. Reliab. 66(2), 440\u2013457 (2017)","journal-title":"IEEE Trans. Reliab."},{"issue":"10","key":"10_CR3","first-page":"2282","volume":"41","author":"J Xiao","year":"2018","unstructured":"Xiao, J., Lee, W., Jiang, J.H., et al.: Sensitivity evaluation of input vectors with masking effects in digital circuits. Chin. J. Comput. 41(10), 2282\u20132294 (2018)","journal-title":"Chin. J. Comput."},{"key":"10_CR4","unstructured":"Bickford, J., Habib, N., Li, B., et al.: Integrated circuit chip reliability qualification using a sample-specific expected fail rate. USA Patent (2018)"},{"issue":"6","key":"10_CR5","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1109\/TC.2012.276","volume":"63","author":"J Han","year":"2014","unstructured":"Han, J., Hao, C., Liang, J.H., et al.: A stochastic computational approach for accurate and efficient reliability evaluation. IEEE Trans. Comput. 63(6), 1336\u20131350 (2014)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"10_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MDT.1984.5005582","volume":"1","author":"M Abramovici","year":"1984","unstructured":"Abramovici, M., Menon, P.R., Miller, D.T.: Critical path tracing: an alternative to fault simulation. IEEE Des. Test Comput. 1(1), 83\u201393 (1984)","journal-title":"IEEE Des. Test Comput."},{"key":"10_CR7","unstructured":"Menon, P.R., Levendel, Y., Abramovici, M.: Critical path tracing in sequential circuits. In: IEEE International Conference on Computer-aided Design, ICCAD-88 Digest of Technical Papers. IEEE (1988)"},{"issue":"4","key":"10_CR8","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1109\/43.75639","volume":"10","author":"M Favalli","year":"1991","unstructured":"Favalli, M., Olivo, P.: A novel critical path heuristic for fast fault grading. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 10(4), 544\u2013548 (1991)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"10_CR9","unstructured":"Girard, P., Landrault, C., Pravossoudovitch, S.: A reconvergent fan-out analysis for the CPT algorithm used in delay-fault diagnosis. In: European Test Conference. IEEE (1993)"},{"key":"10_CR10","unstructured":"Wu, L., Walker, D.M.H.: A fast algorithm for critical path tracing in VLSI digital circuits. In: 20th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2005. DFT 2005. IEEE (2005)"},{"key":"10_CR11","unstructured":"Bosio, A., Girard, P., Pravossoudovitch, S.: An exact and efficient critical path tracing algorithm. In: Fifth IEEE International Symposium on Electronic Design, Test and Application, 2010. DELTA 2010. IEEE (2010)"},{"issue":"2","key":"10_CR12","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1016\/j.ipl.2014.09.031","volume":"115","author":"Chaoyi Pang","year":"2015","unstructured":"Pang, Chaoyi., Junhu Wang, Yu., Cheng, Haolan Zhang, Li, Tongliang: Topological sorts on DAGs. Inf. Process. Lett. 115(2), 298\u2013301 (2015)","journal-title":"Inf. Process. Lett."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Bayer, K., Koch, S., Klein, R.: Monte carlo tree search. Wirtschaftswissenschaftliches studium 47(12), 11\u201318 (2018)","DOI":"10.15358\/0340-1650-2018-12-11"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Wang, D.T.: An algorithm for the generation of test sets for combinational logic networks. IEEE Trans. Comput. C-24(7), 742\u2013746 (1975)","DOI":"10.1109\/T-C.1975.224295"},{"issue":"5","key":"10_CR15","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1007\/s11390-019-1965-1","volume":"34","author":"J Xiao","year":"2019","unstructured":"Xiao, J., Shi, Z.H., Jiang, J.H., et al.: A locating method for reliability-critical gates with a parallel-structured genetic algorithm. J. Comput. Sci. Technol. 34(5), 1136\u20131151 (2019)","journal-title":"J. Comput. Sci. Technol."},{"issue":"7676","key":"10_CR16","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1038\/nature24270","volume":"550","author":"D Silver","year":"2017","unstructured":"Silver, D., Schrittwieser, J., Simonyan, K., et al.: Mastering the game of Go without human knowledge. Nature 550(7676), 354\u2013359 (2017)","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62463-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T08:01:59Z","timestamp":1607932919000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62463-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030624620","9783030624637"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62463-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"360","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"118","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}