{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:37Z","timestamp":1740123577792,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No. 61661013"],"award-info":[{"award-number":["No. 61661013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Guangxi Natural Science Foundation","award":["No. 2018GXNSFBA281175"],"award-info":[{"award-number":["No. 2018GXNSFBA281175"]}]},{"name":"the Basic Ability Enhancement Program for Young and Middle-aged Teachers of Guangxi","award":["No.2022KY0197"],"award-info":[{"award-number":["No.2022KY0197"]}]},{"name":"Innovation Project of GUET Graduate Education","award":["No. 2022YCXS162","No. 2023YCXS119"],"award-info":[{"award-number":["No. 2022YCXS162","No. 2023YCXS119"]}]},{"name":"Guangxi Key Laboratory of Automation Test and Instrumentation","award":["No.YQ22102"],"award-info":[{"award-number":["No.YQ22102"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10836-023-06090-7","type":"journal-article","created":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T06:02:07Z","timestamp":1701928927000},"page":"621-629","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection Method of Hardware Trojan Based on Attention Mechanism and Residual-Dense-Block under the Markov Transition Field"],"prefix":"10.1007","volume":"39","author":[{"given":"Shouhong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhentao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xingna","family":"Hou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,7]]},"reference":[{"key":"6090_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan Detection using IC Fingerprinting. Proc.2007 IEEE Symposium on Security and Privacy (SP \u201907). Berkeley, CA, USA, pp 296\u2013310","DOI":"10.1109\/SP.2007.36"},{"key":"6090_CR2","doi-asserted-by":"crossref","unstructured":"Bao C, Forte D, Srivastava A (2014) On application of one-class SVM to reverse engineering-based hardware Trojan detection. Proc. Fifteenth International Symposium on Quality Electronic Design. Santa Clara, CA, USA, pp 47\u201354","DOI":"10.1109\/ISQED.2014.6783305"},{"key":"6090_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103428","volume":"134","author":"S Chen","year":"2023","unstructured":"Chen S, Wang T, Huang Z, Hou X (2023) Detection method of Golden Chip-Free Hardware Trojan based on the combination of ResNeXt structure and attention mechanism. Comput Secur 134:103428","journal-title":"Comput Secur"},{"key":"6090_CR4","doi-asserted-by":"crossref","unstructured":"Dubeuf J, H\u00e9ly D, Karri R (2013) Run-time detection of hardware Trojans: The processor protection unit. Proc.2013 18th IEEE European Test Symposium (ETS). Avignon, France, pp 1\u20136","DOI":"10.1109\/ETS.2013.6569378"},{"key":"6090_CR5","doi-asserted-by":"crossref","unstructured":"Faezi S, Yasaei R, Al Faruque MA (2021) HTnet: Transfer learning for golden chip-free hardware trojan detection. Proc.2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). Grenoble, France, pp 1484\u20131489","DOI":"10.23919\/DATE51398.2021.9474076"},{"key":"6090_CR6","doi-asserted-by":"publisher","first-page":"2697","DOI":"10.1109\/TIFS.2021.3062989","volume":"16","author":"S Faezi","year":"2021","unstructured":"Faezi S, Yasaei R, Barua A, Faruque MAA (2021) Brain-inspired golden chip free hardware trojan detection. IEEE Trans Inf Forensics Secur 16:2697\u20132708","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6090_CR7","doi-asserted-by":"publisher","first-page":"38299","DOI":"10.1109\/ACCESS.2022.3165193","volume":"10","author":"MM Farag","year":"2022","unstructured":"Farag MM, Fouad M, Abdel-Hamid AT (2022) Automatic severity classification of diabetic retinopathy based on densenet and convolutional block attention module. IEEE Access 10:38299\u201338308","journal-title":"IEEE Access"},{"key":"6090_CR8","doi-asserted-by":"crossref","unstructured":"Forte D, Bao C, Srivastava A (2013) Temperature tracking: an innovative run-time approach for hardware Trojan detection. Proc.2013 IEEE\/ACM Int Conf Comput Aided Des (ICCAD). San Jose, CA, USA, pp 532\u2013539","DOI":"10.1109\/ICCAD.2013.6691167"},{"issue":"2","key":"6090_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MDAT.2014.2347918","volume":"32","author":"S Ghosh","year":"2015","unstructured":"Ghosh S, Basak A, Bhunia S (2015) How secure are printed circuit boards against trojan attacks? IEEE Design & Test 32(2):7\u201316","journal-title":"IEEE Design & Test"},{"key":"6090_CR10","doi-asserted-by":"crossref","unstructured":"Hasegawa K, Shi Y, Togawa N (2018) Hardware Trojan Detection Utilizing Machine Learning Approaches. Proc.2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). New York, NY, USA, pp 1891\u20131896","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00287"},{"issue":"7","key":"6090_CR11","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1587\/transfun.E100.A.1427","volume":"100","author":"K Hasegawa","year":"2017","unstructured":"Hasegawa K, Yanagisawa M, Togawa N (2017) A hardware-Trojan classification method using machine learning at gate-level netlists based on Trojan features. IEICE Trans Fundam Electron Commun Comput Sci 100(7):1427\u20131438","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"6090_CR12","doi-asserted-by":"crossref","unstructured":"Hasegawa K, Yanagisawa M, Togawa N (2017) Hardware Trojans classification for gate-level netlists using multi-layer neural networks. Proc. IEEE Symposium on On-Line Testing and Robust System Design (IOLTS), pp 227\u2013232","DOI":"10.1109\/IOLTS.2017.8046227"},{"key":"6090_CR13","doi-asserted-by":"publisher","first-page":"50828","DOI":"10.1109\/ACCESS.2020.2980243","volume":"8","author":"G Huang","year":"2020","unstructured":"Huang G, Gong Y, Xu Q, Wattanachote K, Zeng K, Luo X (2020) A convolutional attention residual network for stereo matching. IEEE Access 8:50828\u201350842","journal-title":"IEEE Access"},{"key":"6090_CR14","doi-asserted-by":"crossref","unstructured":"Inoue T, Hasegawa K, Kobayashi Y, Yanagisawa M, Togawa N (2018) Designing subspecies of hardware trojans and their detection using neural network approach. Proc. 2018 IEEE 8th Int Conf Consum Electron - Berlin (ICCE-BERLIN). Berlin, Germany","DOI":"10.1109\/ICCE-Berlin.2018.8576247"},{"key":"6090_CR15","unstructured":"Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. Proc.2008 IEEE International Workshop on Hardware-Oriented Security and Trust. Anaheim, CA, pp 51\u201357"},{"key":"6090_CR16","doi-asserted-by":"crossref","unstructured":"Jin Y, Sullivan D (2014) Real-time trust evaluation in integrated circuits. Proc.2014 Design, Automation & Test in Europe Conference & Exhibition (DATE). Dresden, Germany, pp 1\u20136","DOI":"10.7873\/DATE.2014.104"},{"key":"6090_CR17","unstructured":"Jin Y, Maliuk D, Makris Y (2012) Post-deployment trust evaluation in wireless cryptographic ICs. Proc.2012 Design, Automation & Test in Europe Conference & Exhibition (DATE). Dresden, Germany pp 965\u2013970"},{"key":"6090_CR18","unstructured":"Kkalais (2020) Machine Learning Techniques for Hardware Trojan Detection, github.com. Available: https:\/\/github.com\/Kkalais\/Hardware-Trojan-Detection. Accessed 1 Oct 2022"},{"key":"6090_CR19","doi-asserted-by":"crossref","unstructured":"Kulkarni A, Pino Y, Mohsenin T, \u201cSVM-based real-time hardware Trojan detection for many-core platform,\u201d Proc. (2016) 17th International Symposium on Quality Electronic Design (ISQED). Santa Clara, CA, USA 2016:362\u2013367","DOI":"10.1109\/ISQED.2016.7479228"},{"key":"6090_CR20","doi-asserted-by":"crossref","unstructured":"Liu M, Yu Y, Liao Q, Zhang J (2020) Histopathologic cancer detection by dense-attention network with incorporation of prior knowledge. Proc.2020 IEEE 17th International Symposium on Biomedical Imaging (ISBI). Iowa City, IA, USA, pp 466\u2013470","DOI":"10.1109\/ISBI45749.2020.9098625"},{"issue":"12","key":"6090_CR21","doi-asserted-by":"publisher","first-page":"25396","DOI":"10.1109\/TITS.2022.3145815","volume":"23","author":"P Liu","year":"2022","unstructured":"Liu P, Zhang C, Qi H, Wang G, Zheng H (2022) Multi-Attention DenseNet: a scattering medium imaging optimization framework for visual data pre-processing of autonomous driving systems. IEEE Trans Intell Transp Syst 23(12):25396\u201325407","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"6090_CR22","doi-asserted-by":"crossref","unstructured":"Muralidhar N, Zubair A, Weidler N, Gerdes R, Ramakrishnan N (2021) Contrastive graph convolutional networks for hardware trojan detection in third party IP cores. Proc.2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). Tysons Corner, VA, USA, pp 181\u2013191","DOI":"10.1109\/HOST49136.2021.9702276"},{"issue":"3","key":"6090_CR23","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s10836-016-5581-5","volume":"32","author":"AA Nasr","year":"2016","unstructured":"Nasr AA, Abdulmageed MZ (2016) Automatic feature selection of hardware layout: a step toward robust hardware trojan detection. J Electron Test 32(3):357\u2013367","journal-title":"J Electron Test"},{"issue":"12","key":"6090_CR24","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/TCAD.2014.2354293","volume":"33","author":"AN Nowroz","year":"2014","unstructured":"Nowroz AN, Hu K, Koushanfar F, Reda S (2014) Novel techniques for high-sensitivity hardware trojan detection using thermal and power maps. IEEE Trans Comput Aided Des Integr Circuits Syst 33(12):1792\u20131805","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"6090_CR25","doi-asserted-by":"crossref","unstructured":"Rad RM, Wang X, Tehranipoor M, Plusquellic J (2008) Power supply signal calibration techniques for improving detection resolution to hardware Trojans. Proc.2008 IEEE\/ACM Int Conf Comput Aided Des. San Jose, CA, USA, pp 632\u2013639","DOI":"10.1109\/ICCAD.2008.4681643"},{"key":"6090_CR26","unstructured":"Rozhin Yasaei (2022) Hardware Trojan Power & EM Side-Channel dataset, IEEE DataPort. Available: https:\/\/ieee-dataport.org\/open-access\/hardware-trojan-power-em-side-channel-dataset. Accessed 17 Oct 2022"},{"issue":"2","key":"6090_CR27","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TIFS.2016.2613842","volume":"12","author":"H Salmani","year":"2017","unstructured":"Salmani H (2017) COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338\u2013350","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6090_CR28","doi-asserted-by":"crossref","unstructured":"Salmani H, Tehranipoor M, Karri R (2013) On Design vulnerability analysis and trust benchmark development. Proc. 2013 IEEE 31st Int Conf Comput Des (ICCD), pp 471\u2013474","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"6090_CR29","doi-asserted-by":"crossref","unstructured":"Salmani H, Tehranipoor M, Plusquellic J (2010) A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits. Proc.2010 IEEE International Workshop on Information Forensics and Security. Seattle, WA, USA, pp 1\u20136","DOI":"10.1109\/WIFS.2010.5711438"},{"key":"6090_CR30","doi-asserted-by":"crossref","unstructured":"Sankaran S, Mohan VS, Purushothaman A (2021) Deep learning based approach for hardware trojan detection. Proc. 2021 IEEE International Symposium on Smart Electronic Systems (iSES). Jaipur, India pp 177\u2013182","DOI":"10.1109\/iSES52644.2021.00050"},{"key":"6090_CR31","doi-asserted-by":"crossref","unstructured":"Shakya B, He T, Salmani H, Forte D, Bhunia S, Tehranipoor M (2017) Benchmarking of hardware Trojans and maliciously affected circuits. J Hardw Syst Secur (HaSS)","DOI":"10.1007\/s41635-017-0001-6"},{"key":"6090_CR32","doi-asserted-by":"crossref","unstructured":"Sharma R, Sharma GK, Pattanaik M (2021) A few shot learning based approach for hardware Trojan detection using deep siamese CNN. Proc.2021 34th International Conference on VLSI Design and 2021 20th International Conference on Embedded Systems (VLSID). Guwahati, India, pp 163\u2013168","DOI":"10.1109\/VLSID51830.2021.00033"},{"key":"6090_CR33","doi-asserted-by":"crossref","unstructured":"Stellari F, Song P, Weger AJ, Culp J, Herbert A, Pfeiffer D (2017) Verification of untrusted chips using trusted layout and emission measurements. Proc.2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). Arlington, VA, USA, pp 19\u201324","DOI":"10.1109\/HST.2014.6855562"},{"key":"6090_CR34","doi-asserted-by":"crossref","unstructured":"Tang W, Su J, He J, Gao Y (2022) A deep learning method based on the attention mechanism for hardware trojan detection. Electronics, vol 11, no 15, pp 2400","DOI":"10.3390\/electronics11152400"},{"key":"6090_CR35","unstructured":"Tehranipoor M, Karri R, Koushanfar F, Potkonjak M (2016) Trusthub. Available online: https:\/\/www.trust-hub.org"},{"key":"6090_CR36","doi-asserted-by":"publisher","first-page":"4121","DOI":"10.1109\/JSTARS.2020.3009352","volume":"13","author":"W Tong","year":"2020","unstructured":"Tong W, Chen W, Han W, Li X, Wang L (2020) Channel-attention-based densenet network for remote sensing image scene classification. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 13:4121\u20134132","journal-title":"IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing"},{"key":"6090_CR37","doi-asserted-by":"crossref","unstructured":"Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis. Proc.2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems. Cambridge, MA, USA, pp 87\u201395","DOI":"10.1109\/DFT.2008.61"},{"key":"6090_CR38","doi-asserted-by":"crossref","unstructured":"Woo S, Park J, Lee. JY, Kweon IS (2018) CBAM: Convolutional block attention module. Computer Vision \u2013 ECCV 2018. ECCV 2018, vol 11211, pp 3\u201319","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"6090_CR39","doi-asserted-by":"crossref","unstructured":"Xie L, Huang C (2019) A residual network of water scene recognition based on optimized inception module and convolutional block attention module. Proc.2019 6th Int Conf Syst Informatics (ICSAI). Shanghai, China, pp 1174\u20131178","DOI":"10.1109\/ICSAI48974.2019.9010503"},{"key":"6090_CR40","doi-asserted-by":"crossref","unstructured":"Xu Y, Chen Z, Huang B, Liu X, Dong C (2021) HTtext: A TextCNN-based pre-silicon detection for hardware Trojans. Proc.2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom). New York City, NY, USA, pp 55\u201362","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00022"},{"issue":"4","key":"6090_CR41","doi-asserted-by":"publisher","first-page":"1837","DOI":"10.1109\/TETC.2021.3116484","volume":"10","author":"S Yu","year":"2022","unstructured":"Yu S, Gu C, Liu W, O\u2019Neill M (2022) Deep learning-based hardware trojan detection with block-based netlist information extraction. IEEE Trans Emerg Top Comput 10(4):1837\u20131853","journal-title":"IEEE Trans Emerg Top Comput"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06090-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-023-06090-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06090-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T05:06:31Z","timestamp":1705899991000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-023-06090-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":41,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["6090"],"URL":"https:\/\/doi.org\/10.1007\/s10836-023-06090-7","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"27 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All the authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interests"}}]}}