{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:04:31Z","timestamp":1764785071811,"version":"build-2065373602"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T00:00:00Z","timestamp":1678492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T00:00:00Z","timestamp":1678492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11276-023-03305-9","type":"journal-article","created":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T17:02:40Z","timestamp":1678554160000},"page":"5455-5463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Securing FPGAs in IoT: a new run-time monitoring technique against hardware Trojan"],"prefix":"10.1007","volume":"30","author":[{"given":"Jian","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Quanyuan","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wenxiu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,11]]},"reference":[{"issue":"4","key":"3305_CR1","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431\u2013440. https:\/\/doi.org\/10.1016\/j.bushor.2015.03.008","journal-title":"Business Horizons"},{"key":"3305_CR2","doi-asserted-by":"publisher","unstructured":"Gong, W., Zhang, X., Chen, Y., He, Q., Beheshti, A., Xu, X., Yan, C., & Qi, L., (2022). DAWAR: Diversity-aware web APIs recommendation with compatibility guarantee for mashup creation. In The 45th international ACM SIGIR conference on research and development in information retrieval (pp. 395\u2013404). https:\/\/doi.org\/10.1145\/3477495.3531962.","DOI":"10.1145\/3477495.3531962"},{"issue":"9","key":"3305_CR3","doi-asserted-by":"publisher","first-page":"6379","DOI":"10.1109\/TII.2021.3133614","volume":"18","author":"W Gong","year":"2022","unstructured":"Gong, W., Zhang, W., Bilal, M., Chen, Y., Xu, X., & Wang, W. (2022). Efficient web APIs recommendation with privacy-preservation for mobile app development in industry 4.0. IEEE Transactions on Industrial Informatics, 18(9), 6379\u20136387. https:\/\/doi.org\/10.1109\/TII.2021.3133614","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"3305_CR4","doi-asserted-by":"publisher","first-page":"2337","DOI":"10.1002\/spe.2902","volume":"51","author":"W Gong","year":"2021","unstructured":"Gong, W., Lv, C., Duan, Y., Liu, Z., Khosravi, M. R., Qi, L., & Dou, W. (2021). Keywords-driven web APIs group recommendation for automatic app service creation process. Software Practice and Experience, 51, 2337\u20132354. https:\/\/doi.org\/10.1002\/spe.2902","journal-title":"Software Practice and Experience"},{"key":"3305_CR5","doi-asserted-by":"publisher","first-page":"51313","DOI":"10.1109\/ACCESS.2021.3069223","volume":"9","author":"H Oh","year":"2021","unstructured":"Oh, H., Nam, K., Jeon, S., Cho, Y., & Paek, Y. (2021). MeetGo: A trusted execution environment for remote applications on FPGA. IEEE Access, 9, 51313\u201351324. https:\/\/doi.org\/10.1109\/ACCESS.2021.3069223","journal-title":"IEEE Access"},{"issue":"2","key":"3305_CR6","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1109\/TCC.2020.2969655","volume":"10","author":"M Okada","year":"2022","unstructured":"Okada, M., Suzuki, T., Nishio, N., Waidyasooriya, H. M., & Hariyama, M. (2022). FPGA-accelerated searchable encrypted database management systems for cloud services. IEEE Transactions on Cloud Computing, 10(2), 1373\u20131385. https:\/\/doi.org\/10.1109\/TCC.2020.2969655","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"6","key":"3305_CR7","doi-asserted-by":"publisher","first-page":"4214","DOI":"10.1109\/JIOT.2021.3103035","volume":"9","author":"B Tan","year":"2022","unstructured":"Tan, B., Mok, K., Chang, J., Lee, W., & Hwang, S. O. (2022). RISC32-LP: Low-power FPGA-based IoT sensor nodes with energy reduction program analyzer. IEEE Internet of Things Journal, 9(6), 4214\u20134228. https:\/\/doi.org\/10.1109\/JIOT.2021.3103035","journal-title":"IEEE Internet of Things Journal"},{"key":"3305_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3179231","author":"X Zhou","year":"2022","unstructured":"Zhou, X., Liang, W., Yan, K., Li, W., Wang, K., Ma, J., & Jin, Q. (2022). Edge enabled two-stage scheduling based on deep reinforcement learning for Internet of Everything. IEEE Internet of Things Journal, Early Access. https:\/\/doi.org\/10.1109\/JIOT.2022.3179231","journal-title":"IEEE Internet of Things Journal, Early Access."},{"issue":"1","key":"3305_CR9","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/TII.2022.3170149","volume":"19","author":"X Zhou","year":"2022","unstructured":"Zhou, X., Hu, Y., Wu, J., Liang, W., Ma, J., & Jin, Q. (2022). Distribution bias aware collaborative generative adversarial network for imbalanced deep learning in industrial IoT. IEEE Transactions on Industrial Informatics, 19(1), 570\u2013580. https:\/\/doi.org\/10.1109\/TII.2022.3170149","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"16","key":"3305_CR10","doi-asserted-by":"publisher","first-page":"14988","DOI":"10.1109\/JIOT.2021.3077937","volume":"9","author":"X Zhou","year":"2022","unstructured":"Zhou, X., Yang, X., Ma, J., & Wang, K. (2022). Energy-efficient smart routing based on link correlation mining for wireless edge computing in IoT. IEEE Internet of Things Journal, 9(16), 14988\u201314997. https:\/\/doi.org\/10.1109\/JIOT.2021.3077937","journal-title":"IEEE Internet of Things Journal"},{"issue":"8","key":"3305_CR11","doi-asserted-by":"publisher","first-page":"5087","DOI":"10.1109\/TII.2021.3116085","volume":"18","author":"W Liang","year":"2022","unstructured":"Liang, W., Hu, Y., Zhou, X., Pan, Y., & Wang, K. (2022). Variational few-shot learning for microservice-oriented intrusion detection in distributed industrial IoT. IEEE Transactions on Industrial Informatics, 18(8), 5087\u20135095. https:\/\/doi.org\/10.1109\/TII.2021.3116085","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"12","key":"3305_CR12","doi-asserted-by":"publisher","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","volume":"9","author":"X Zhou","year":"2022","unstructured":"Zhou, X., Liang, W., Li, W., Yan, K., Shimizu, S., & Wang, K. (2022). Hierarchical adversarial attacks against graph neural network based IoT network intrusion detection system. IEEE Internet of Things Journal, 9(12), 9310\u20139319. https:\/\/doi.org\/10.1109\/JIOT.2021.3130434","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"3305_CR13","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1109\/TII.2021.3061419","volume":"18","author":"X Zhou","year":"2022","unstructured":"Zhou, X., Xu, X., Liang, W., Zeng, Z., Shimizu, S., Yang, L. T., & Jin, Q. (2022). Intelligent small object detection based on digital twinning for smart manufacturing in industrial CPS. IEEE Transactions on Industrial Informatics, 18(2), 1377\u20131386.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"3305_CR14","doi-asserted-by":"publisher","first-page":"10670","DOI":"10.1002\/int.22935","volume":"32","author":"F Lu","year":"2022","unstructured":"Lu, F., Zhang, Z., Guo, L., Chen, J., Zhu, Y., Yan, K., & Zhou, X. (2022). HFENet: A lightweight hand-crafted feature enhanced CNN for ceramic tile surface defect detection. International Journal of Intelligent Systems, 32(2), 10670\u201311069. https:\/\/doi.org\/10.1002\/int.22935","journal-title":"International Journal of Intelligent Systems"},{"key":"3305_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07709-0","author":"J Chen","year":"2022","unstructured":"Chen, J., Li, Y., Guo, L., Zhou, X., Zhu, Y., He, Q., Han, H., & Feng, Q. (2022). Machine learning techniques for CT imaging diagnosis of novel coronavirus. Neural Computing and Applications. (Special Issue). https:\/\/doi.org\/10.1007\/s00521-022-07709-0","journal-title":"Neural Computing and Applications. (Special Issue)"},{"key":"3305_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2022.3205064","author":"L Kong","year":"2022","unstructured":"Kong, L., Li, G., Rafique, W., Shen, S., He, Q., Khosravi, M. R., Wang, R., & Qi, L. (2022). Time-aware missing healthcare data prediction based on ARIMA model. IEEE\/ACM Transactions on Computational Biology and Bioinformatics (Early Access). https:\/\/doi.org\/10.1109\/TCBB.2022.3205064","journal-title":"IEEE\/ACM Transactions on Computational Biology and Bioinformatics (Early Access)"},{"issue":"1","key":"3305_CR17","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1002\/int.22620","volume":"37","author":"Y Liu","year":"2021","unstructured":"Liu, Y., Li, D., Wan, S., Wang, F., Dou, W., Xu, X., Li, S., Ma, R., & Qi, L. (2021). A long short-term memory-based model for greenhouse climate prediction. International Journal of Intelligent Systems, 37(1), 135\u2013151. https:\/\/doi.org\/10.1002\/int.22620","journal-title":"International Journal of Intelligent Systems"},{"key":"3305_CR18","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1007\/s11280-021-00941-z","volume":"25","author":"L Kong","year":"2021","unstructured":"Kong, L., Wang, L., Gong, W., Yan, C., Duan, Y., & Qi, L. (2021). LSH-aware multitype health data prediction with privacy preservation in edge environment. World Wide Web Journal, 25, 1793\u20131808. https:\/\/doi.org\/10.1007\/s11280-021-00941-z","journal-title":"World Wide Web Journal"},{"issue":"4","key":"3305_CR19","doi-asserted-by":"publisher","first-page":"986","DOI":"10.1109\/TCSS.2021.3064213","volume":"9","author":"F Wang","year":"2021","unstructured":"Wang, F., Zhu, H., Srivastava, G., Li, S., Khosravi, M. R., & Qi, L. (2021). Robust collaborative filtering recommendation with user-item-trust records. IEEE Transactions on Computational Social Systems, 9(4), 986\u2013996. https:\/\/doi.org\/10.1109\/TCSS.2021.3064213","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"3305_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3168611","author":"L Qi","year":"2022","unstructured":"Qi, L., Lin, W., Zhang, X., Dou, W., Xu, X., & Chen, J. (2022). A correlation graph based approach for personalized and compatible web APIs recommendation in Mobile APP development. IEEE Transactions on Knowledge and Data Engineering (Early Access). https:\/\/doi.org\/10.1109\/TKDE.2022.3168611","journal-title":"IEEE Transactions on Knowledge and Data Engineering (Early Access)"},{"key":"3305_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07874-2","author":"J Chen","year":"2022","unstructured":"Chen, J., Qin, F., Lu, F., Guo, L., Li, C., Yan, K., & Zhou, X. (2022). CSPP-IQA: A multi-scale spatial pyramid pooling based approach for medical image quality assessment. Neural Computing and Applications (Special Issue). https:\/\/doi.org\/10.1007\/s00521-022-07874-2","journal-title":"Neural Computing and Applications (Special Issue)"},{"issue":"11","key":"3305_CR22","doi-asserted-by":"publisher","first-page":"11115","DOI":"10.1109\/JIOT.2020.2994627","volume":"7","author":"S Guo","year":"2020","unstructured":"Guo, S., Wang, J., Chen, Z., Li, Y., & Lu, Z. (2020). Securing IoT space via hardware trojan detection. IEEE Internet of Things Journal, 7(11), 11115\u201311122. https:\/\/doi.org\/10.1109\/JIOT.2020.2994627","journal-title":"IEEE Internet of Things Journal"},{"key":"3305_CR23","doi-asserted-by":"publisher","unstructured":"Yoon, J., Seo, Y., Jang, J., Cho, M., Kim, J., Kim, H., & Kwon, T. (2018). A bitstream reverse engineering tool for FPGA hardware trojan detection. In Proceedings of the 2018 ACM SIGSAC conference on computer and communications security (pp. 2318\u20132320). https:\/\/doi.org\/10.1145\/3243734.3278487.","DOI":"10.1145\/3243734.3278487"},{"key":"3305_CR24","doi-asserted-by":"publisher","unstructured":"Guo, X., Dutta, R. G., Jin, Y., Farahmandi F., & Mishra P. (2015). Pre-silicon security verification and validation: A formal perspective. In Proceedings of the 52nd annual design automation conference (pp. 1\u20136). https:\/\/doi.org\/10.1145\/2744769.2747939.","DOI":"10.1145\/2744769.2747939"},{"issue":"8","key":"3305_CR25","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MC.2016.225","volume":"49","author":"W Hu","year":"2016","unstructured":"Hu, W., Mao, B., Oberg, J., & Kastner, R. (2016). Detecting hardware trojans with gate-level information-flow tracking. Computer, 49(8), 44\u201352. https:\/\/doi.org\/10.1109\/MC.2016.225","journal-title":"Computer"},{"key":"3305_CR26","doi-asserted-by":"publisher","first-page":"3387","DOI":"10.1109\/TIFS.2019.2946044","volume":"15","author":"K Huang","year":"2019","unstructured":"Huang, K., & He, Y. (2019). Trigger identification using difference-amplified controllability and dynamic transition probability for hardware trojan detection. IEEE Transactions on Information Forensics and Security, 15, 3387\u20133400. https:\/\/doi.org\/10.1109\/TIFS.2019.2946044","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3305_CR27","doi-asserted-by":"publisher","unstructured":"Hicks, M., Finnicum, M., King, S. T., Martin, M. M. K., & Smith, J. M. (2010). Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In IEEE symposium on security and privacy (pp. 159\u2013163). https:\/\/doi.org\/10.1109\/SP.2010.18.","DOI":"10.1109\/SP.2010.18"},{"issue":"7","key":"3305_CR28","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/TCAD.2015.2422836","volume":"34","author":"J Zhang","year":"2015","unstructured":"Zhang, J., Yuan, F., Wei, L., Liu, Y., & Xu, Q. (2015). VeriTrust: Verification for hardware trust. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34(7), 1148\u20131161. https:\/\/doi.org\/10.1109\/TCAD.2015.2422836","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"3305_CR29","doi-asserted-by":"publisher","unstructured":"Waksman, A., Suozzo, M., & Sethumadhavan, S. (2013) FANCI: identification of stealthy malicious logic using boolean functional analysis. In Proceedings of ACM SIGSAC conference on Computer & communications security (pp. 697\u2013708). https:\/\/doi.org\/10.1145\/2508859.2516654.","DOI":"10.1145\/2508859.2516654"},{"issue":"7","key":"3305_CR30","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/TCAD.2017.2753201","volume":"37","author":"M Zou","year":"2017","unstructured":"Zou, M., Cui, X., Shi, L., & Wu, K. (2017). Potential trigger detection for hardware trojans. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37(7), 1384\u20131395. https:\/\/doi.org\/10.1109\/TCAD.2017.2753201","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"issue":"1","key":"3305_CR31","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TVLSI.2010.2093547","volume":"20","author":"H Salmani","year":"2011","unstructured":"Salmani, H., Tehranipoor, M., & Plusquellic, J. (2011). A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 20(1), 112\u2013125. https:\/\/doi.org\/10.1109\/TVLSI.2010.2093547","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"3305_CR32","doi-asserted-by":"publisher","unstructured":"Nigh, C., & Orailoglu, A. (2020). Test pattern superposition to detect hardware Trojans. In 2020 design, automation & test in europe conference & exhibition (DATE) (pp. 25\u201330). https:\/\/doi.org\/10.23919\/DATE48585.2020.9116264.","DOI":"10.23919\/DATE48585.2020.9116264"},{"key":"3305_CR33","doi-asserted-by":"publisher","first-page":"38379","DOI":"10.1109\/ACCESS.2019.2901949","volume":"7","author":"T Zhang","year":"2019","unstructured":"Zhang, T., Wang, J., Guo, S., & Chen, Z. (2019). A comprehensive FPGA reverse engineering tool-chain: From bitstream to RTL code. IEEE Access, 7, 38379\u201338389. https:\/\/doi.org\/10.1109\/ACCESS.2019.2901949","journal-title":"IEEE Access"},{"issue":"10","key":"3305_CR34","doi-asserted-by":"publisher","first-page":"2939","DOI":"10.1109\/TVLSI.2017.2727985","volume":"25","author":"J He","year":"2017","unstructured":"He, J., Zhao, Y., Guo, X., & Jin, Y. (2017). Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 25(10), 2939\u20132948. https:\/\/doi.org\/10.1109\/TVLSI.2017.2727985","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"issue":"7","key":"3305_CR35","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1109\/TVLSI.2019.2906547","volume":"27","author":"LN Nguyen","year":"2019","unstructured":"Nguyen, L. N., Cheng, C., Prvulovic, M., & Zaji\u0107, A. (2019). Creating a backscattering side channel to enable detection of dormant hardware trojans. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 27(7), 1561\u20131574. https:\/\/doi.org\/10.1109\/TVLSI.2019.2906547","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"3305_CR36","doi-asserted-by":"publisher","unstructured":"Pyrgas, L., Pirpilidis, F., Panayiotarou, A., & Kitsos, P. (2017). Thermal sensor based hardware Trojan detection in FPGAs. In Euromicro conference on digital system design (pp. 268\u2013272). https:\/\/doi.org\/10.1109\/DSD.2017.36.","DOI":"10.1109\/DSD.2017.36"},{"key":"3305_CR37","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/ICCAD.2013.6691167","volume":"2013","author":"D Forte","year":"2013","unstructured":"Forte, D., Bao, C., & Srivastava, A. (2013). Temperature tracking: An innovative run-time approach for hardware Trojan detection. IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), 2013, 532\u2013535. https:\/\/doi.org\/10.1109\/ICCAD.2013.6691167","journal-title":"IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)"},{"issue":"10","key":"3305_CR38","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1109\/TCAD.2015.2424929","volume":"34","author":"C Bao","year":"2015","unstructured":"Bao, C., Forte, D., & Srivastava, A. (2015). Temperature tracking: Toward robust run-time detection of hardware Trojans. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34(10), 1577\u20131585. https:\/\/doi.org\/10.1109\/TCAD.2015.2424929","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"issue":"4","key":"3305_CR39","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/TDSC.2018.2864733","volume":"17","author":"H Zhao","year":"2018","unstructured":"Zhao, H., Kwiat, L., Kwiat, K. A., Kamhoua, C. A., & Njilla, L. (2018). Applying chaos theory for runtime hardware Trojan monitoring and detection. IEEE Transactions on Dependable and Secure Computing, 17(4), 716\u2013729. https:\/\/doi.org\/10.1109\/TDSC.2018.2864733","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"3305_CR40","doi-asserted-by":"publisher","unstructured":"Micco, L. D., Minchola, C., Leon-Franco, J. J., Boemo, E., & Antonelli, M. (2020). An annotated guide to utilize ring-oscillators as thermal sensor in FPGA technology. In Argentine conference on electronics (pp. 1\u20137). https:\/\/doi.org\/10.1109\/CAE48787.2020.9046367.","DOI":"10.1109\/CAE48787.2020.9046367"},{"key":"3305_CR41","doi-asserted-by":"publisher","unstructured":"Franco, J. L., Boemo, E., Castillo, E., & Parrilla, L. (2010). Ring oscillators as thermal sensors in FPGAs: Experiments in low voltage. In VI Southern programmable logic conference (pp. 35\u201337). https:\/\/doi.org\/10.1109\/SPL.2010.5483027.","DOI":"10.1109\/SPL.2010.5483027"},{"key":"3305_CR42","doi-asserted-by":"publisher","first-page":"100306","DOI":"10.1016\/j.cosrev.2020.100306","volume":"38","author":"A Smiti","year":"2020","unstructured":"Smiti, A. (2020). A critical overview of outlier detection methods. Computer Science Review, 38, 100306\u2013100308. https:\/\/doi.org\/10.1016\/j.cosrev.2020.100306","journal-title":"Computer Science Review"},{"key":"3305_CR43","doi-asserted-by":"publisher","unstructured":"Yang, W. (2021). Technology of chip security monitoring based on physical field information. Master Thesis, University of Electronic Science and Technology of China, Chengdu. https:\/\/doi.org\/10.27005\/d.cnki.gdzku.2021.001980.","DOI":"10.27005\/d.cnki.gdzku.2021.001980"},{"key":"3305_CR44","doi-asserted-by":"publisher","unstructured":"Qin, Y., & Xia, T. (2017). Sensitivity analysis of ring oscillator based hardware Trojan detection. In 17th IEEE international conference on communication technology (pp. 1979\u20131981). https:\/\/doi.org\/10.1109\/ICCT.2017.8359975.","DOI":"10.1109\/ICCT.2017.8359975"},{"key":"3305_CR45","doi-asserted-by":"publisher","unstructured":"Cao, Y., Chang, C., Chen, S. (2013). Cluster-based distributed active current timer for hardware Trojan detection. In IEEE international symposium on circuits and systems (ISCAS) (pp. 1010\u20131013). https:\/\/doi.org\/10.1109\/ISCAS.2013.6572020.","DOI":"10.1109\/ISCAS.2013.6572020"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03305-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-023-03305-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03305-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T16:30:59Z","timestamp":1722616259000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-023-03305-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,11]]},"references-count":45,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3305"],"URL":"https:\/\/doi.org\/10.1007\/s11276-023-03305-9","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2023,3,11]]},"assertion":[{"value":"16 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}