{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:26Z","timestamp":1740123566517,"version":"3.37.3"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s10836-021-05936-2","type":"journal-article","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T11:03:28Z","timestamp":1617275008000},"page":"279-284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Method of Implanting Hardware Trojan Based on EHW in Part of Circuit"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3223-2776","authenticated-orcid":false,"given":"Lijun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaohan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,1]]},"reference":[{"issue":"8","key":"5936_CR1","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia S, Hsiao MS, Banga M, Narasimhanand S (2014) Hardware Trojan Attacks: Threat Analysis and Countermeasures. Proc IEEE 102(8):1229\u20131247","journal-title":"Proc IEEE"},{"issue":"1","key":"5936_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2906147","volume":"22","author":"K Xiao","year":"2016","unstructured":"Xiao K, Forte D, Jin Y, Karri R, Bhunia S, Tehranipoor M (2016) Hardware Trojans: Lessons Learned after One Decade of Research. ACM Trans Des Autom Electron Syst 22(1):1\u201323","journal-title":"ACM Trans Des Autom Electron Syst"},{"issue":"9","key":"5936_CR3","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1109\/TCAD.2016.2638439","volume":"36","author":"N Fern","year":"2017","unstructured":"Fern N, San I, Ko\u00e7 \u00c7K, Cheng KT (2017) Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality. IEEE Trans Comput-Aided Design Integr Circuits Syst 36(9):1435\u20131444","journal-title":"IEEE Trans Comput-Aided Design Integr Circuits Syst"},{"key":"5936_CR4","doi-asserted-by":"crossref","unstructured":"Sepulveda J, Gross M, Zankl A, Sigl G (2017) Exploiting Bus Communication to Improve Cache Attacks on Systems-on-Chips, In: Proc. 2017 IEEE Computer Society Annual Symposium, pp 284\u2013289","DOI":"10.1109\/ISVLSI.2017.57"},{"key":"5936_CR5","doi-asserted-by":"crossref","unstructured":"Yang Y, Wu L, Yuan Y, Zhang X (2019) A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-Serial Structure, In: Proc. Security and Privacy in New Computing Environments, pp 647\u2013655","DOI":"10.1007\/978-3-030-21373-2_54"},{"key":"5936_CR6","doi-asserted-by":"crossref","unstructured":"Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008) Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme, in Proceedings of the conference on Design, Automation and Test in Europe (DATE\u20192008), pp 1362\u20131365","DOI":"10.1109\/DATE.2008.4484928"},{"issue":"3","key":"5936_CR7","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1587\/transinf.2017EDP7231","volume":"E101D","author":"R Yao","year":"2018","unstructured":"Yao R, Zhu P, Du J, Wang M, Zhou Z (2018) A General Low-Cost Fast Hybrid Reconfiguration Architecture for FPGA-Based Self-Adaptive System. IEICE Trans Inf Syst E101D(3):616\u2013626","journal-title":"IEICE Trans Inf Syst"},{"key":"5936_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-319-67997-6_3","volume":"28","author":"B Henson","year":"2018","unstructured":"Henson B, Walker JA, Trefzer MA, Tyrrell AM (2018) Designing Digital Systems Using Cartesian Genetic Programming and VHDL. Inspired by Nature 28:57\u201386","journal-title":"Inspired by Nature"},{"issue":"1","key":"5936_CR9","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1049\/cje.2017.09.009","volume":"27","author":"J Zhang","year":"2018","unstructured":"Zhang J, Cai J, Meng Y (2018) Optimal Design of Rectification Circuit in Electronic Circuit Fault Self-repair Based on EHW and RBT. Chin J Electron 27(1):93\u2013101","journal-title":"Chin J Electron"},{"key":"5936_CR10","first-page":"22","volume":"8","author":"J Zhang","year":"2018","unstructured":"Zhang J, Cai J, Meng Y (2018) The fault self-repair strategy under the various fault patterns based on EHW and RBT. WSEAS Transactions on Electronics 8:22\u201332","journal-title":"WSEAS Transactions on Electronics"},{"key":"5936_CR11","doi-asserted-by":"crossref","unstructured":"Zhang J, Cai J, Meng Y, Meng T (2016) A novel self-adaptive Circuit design technique based on evolvable hardware, International Journal of Automation and Computing pp:43473","DOI":"10.1007\/s11633-016-1000-8"},{"issue":"3","key":"5936_CR12","doi-asserted-by":"publisher","first-page":"289","DOI":"10.3233\/ICA-180561","volume":"25","author":"MA Almeida","year":"2018","unstructured":"Almeida MA, Pedrino EC (2018) Hybrid Evolvable Hardware for automatic generation of image filters. Integrated Computer-Aided Engineering 25(3):289\u2013303","journal-title":"Integrated Computer-Aided Engineering"},{"key":"5936_CR13","doi-asserted-by":"crossref","unstructured":"Miller JF, Thomson P (2000) Cartesian genetic programming, In Proceedings of the 3rd European Conference on Genetic Programming, 1802(1):121\u2013132","DOI":"10.1007\/978-3-540-46239-2_9"},{"issue":"5","key":"5936_CR14","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.knosys.2010.01.011","volume":"23","author":"W Zhang","year":"2010","unstructured":"Zhang W, Yoshida T, Tang X, Wang Q (2010) Text clustering using frequent itemsets. Knowl-Based Syst 23(5):379\u2013388","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"5936_CR15","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.compmedimag.2005.10.001","volume":"30","author":"KS Chuang","year":"2006","unstructured":"Chuang KS, Tzeng HL, Chen S, Wu J, Chen TJ (2006) Fuzzy c-means clustering with spatial information for image segmentation. Comput Med Imaging Graph 30(1):9\u201315","journal-title":"Comput Med Imaging Graph"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-021-05936-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-021-05936-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-021-05936-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T05:08:05Z","timestamp":1627448885000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-021-05936-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["5936"],"URL":"https:\/\/doi.org\/10.1007\/s10836-021-05936-2","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"5 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}