{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T11:23:17Z","timestamp":1762082597400,"version":"build-2065373602"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/asianhost56390.2022.10022175","type":"proceedings-article","created":{"date-parts":[[2023,1,25]],"date-time":"2023-01-25T18:47:19Z","timestamp":1674672439000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["On the Limitations of Logic Locking the Approximate Circuits"],"prefix":"10.1109","author":[{"given":"Kartik","family":"Nayak","sequence":"first","affiliation":[{"name":"Universit&#x00E0; della Svizzera italiana,Lugano,Switzerland"}]},{"given":"Devanshi","family":"Upadhyaya","sequence":"additional","affiliation":[{"name":"University of Stuttgart,Stuttgart,Germany"}]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[{"name":"Universit&#x00E0; della Svizzera italiana,Lugano,Switzerland"}]},{"given":"Ilia","family":"Polian","sequence":"additional","affiliation":[{"name":"University of Stuttgart,Stuttgart,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2893356"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3097264"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630068"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.929671"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3243497"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3030121"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3094124"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3057576"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2010.284"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2009.2027626"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NANO.2013.6720793"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484850"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SOCDC.2010.5682905"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2011.51"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2014.6873671"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2801220"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i1.175-202"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176634"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.193"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2404876"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i3.418-440"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495588"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062226"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2968183"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED48828.2020.9136991"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2020.3025135"},{"key":"ref31","first-page":"189","article-title":"Domenic Forte Novel bypass attack and BDD-based tradeoff analysis against all known logic locking attacks","volume-title":"International conference on cryptographic hardware and embedded systems","author":"Xu"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2013.6691207"}],"event":{"name":"2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","start":{"date-parts":[[2022,12,14]]},"location":"Singapore, Singapore","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10022048\/10022017\/10022175.pdf?arnumber=10022175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T15:31:17Z","timestamp":1709393477000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10022175\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/asianhost56390.2022.10022175","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}