{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T14:05:49Z","timestamp":1775657149509,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008081","name":"Southeast University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008081","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,22]]},"DOI":"10.1109\/dac63849.2025.11133324","type":"proceedings-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T17:35:41Z","timestamp":1757957741000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Insights from Rights and Wrongs: A Large Language Model for Solving Assertion Failures in RTL Design"],"prefix":"10.1109","author":[{"given":"Jie","family":"Zhou","sequence":"first","affiliation":[{"name":"Southeast University,School of Integrated Circuits,China"}]},{"given":"Youshu","family":"Ji","sequence":"additional","affiliation":[{"name":"National Center of Technology Innovation for EDA,China"}]},{"given":"Ning","family":"Wang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong"}]},{"given":"Yuchen","family":"Hu","sequence":"additional","affiliation":[{"name":"Southeast University,School of Integrated Circuits,China"}]},{"given":"Xinyao","family":"Jiao","sequence":"additional","affiliation":[{"name":"Southeast University,School of Integrated Circuits,China"}]},{"given":"Bingkun","family":"Yao","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong"}]},{"given":"Xinwei","family":"Fang","sequence":"additional","affiliation":[{"name":"University of York,Department of Computer Science,UK"}]},{"given":"Shuai","family":"Zhao","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University,Department of Computer Science,China"}]},{"given":"Nan","family":"Guan","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong"}]},{"given":"Zhe","family":"Jiang","sequence":"additional","affiliation":[{"name":"Southeast University,School of Integrated Circuits,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Electronic design automation: synthesis, verification, and test","author":"Wang","year":"2009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744823"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3510578"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630082"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/c2021-0-02714-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ITCIndia62949.2024.10651860"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3649476.3660378"},{"key":"ref8","article-title":"Assertllm: Generating and evaluating hardware verification assertions from design specifications via multi-llms","author":"Fang","year":"2024","journal-title":"arXiv preprint arXiv:2402.00386"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.findings-naacl.449"},{"key":"ref10","first-page":"arXiv-2309","article-title":"Using llms to facilitate formal verification of rtl","author":"Orenes-Vera","year":"2023","journal-title":"arXiv e-prints"},{"key":"ref11","article-title":"Towards improving verification productivity with circuit-aware translation of natural language to systemverilog assertions","volume-title":"First International Workshop on Deep Learning-aided Verification","author":"Sun"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD57390.2023.10323812"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3643681"},{"key":"ref14","article-title":"Large language model for verilog generation with golden code feedback","author":"Wang","year":"2024","journal-title":"arXiv preprint arXiv:2407.18271"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i1.32007"},{"key":"ref16","article-title":"Autochip: Automating hdl generation using 1 lm feedback","author":"Thakur","year":"2023","journal-title":"arXiv preprint arXiv:2311.04887"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3676536.3676801"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST59942.2023.10409307"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3735638"},{"key":"ref20","article-title":"Deepseek-coder: When the large language model meets programming-the rise of code intelligence","author":"Guo","year":"2024","journal-title":"arXiv preprint arXiv:2401.14196"},{"key":"ref21","first-page":"24824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume":"35","author":"Wei","year":"2022","journal-title":"Advances in neural information processing systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10137086"},{"issue":"99","key":"ref23","first-page":"3","article-title":"Icarus verilog: open-source verilog more than a year later","volume":"2002","author":"Williams","year":"2002","journal-title":"Linux Journal"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO60963.2024.10569238"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/eStream61684.2024.10542617"},{"key":"ref26","article-title":"A comprehensive survey of hallucination mitigation techniques in large language models","author":"Tonmoy","year":"2024","journal-title":"arXiv preprint arXiv:2401.01313"},{"key":"ref27","article-title":"Symbiyosys","author":"Wolf","year":"2022"},{"key":"ref28","article-title":"Location is key: Leveraging large language model for functional bug localization in verilog","author":"Yao","year":"2024","journal-title":"arXiv preprint arXiv:2409.15186"},{"key":"ref29","article-title":"Between words and characters: A brief history of open-vocabulary modeling and tokenization in nlp","author":"Mielke","year":"2021","journal-title":"arXiv preprint arXiv:2112.10508"},{"key":"ref30","article-title":"Is next token prediction sufficient for gpt? exploration on code logic comprehension","author":"Qi","year":"2024","journal-title":"arXiv preprint arXiv:2404.08885"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/p16-1162"},{"key":"ref32","article-title":"Byte pair encoding: A text compression scheme that accelerates pattern matching","author":"Shibata","year":"1999"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1159\/000113158"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/jcpy.1313"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-long.169"},{"key":"ref36","article-title":"Gaining wisdom from setbacks: Aligning large language models via mistake analysis","author":"Chen","year":"2023","journal-title":"arXiv preprint arXiv:2310.10477"},{"key":"ref37","article-title":"Learning from mistakes makes llm better reasoner","author":"An","year":"2023","journal-title":"arXiv preprint arXiv:2310.20689"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC58780.2024.10473904"},{"key":"ref39","article-title":"Gpt-4 technical report","volume-title":"arXiv preprint arXiv:2303.08774","author":"Achiam","year":"2023"},{"key":"ref40","article-title":"Code llama: Open foundation models for code","author":"Roziere","year":"2023","journal-title":"arXiv preprint arXiv:2308.12950"},{"key":"ref41","article-title":"Towards llm-powered verilog rtl assistant: Self-verification and self-correction","author":"Huang","year":"2024","journal-title":"arXiv preprint arXiv:2406.00115"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/LAD62341.2024.10691788"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3406703"}],"event":{"name":"2025 62nd ACM\/IEEE Design Automation Conference (DAC)","location":"San Francisco, CA, USA","start":{"date-parts":[[2025,6,22]]},"end":{"date-parts":[[2025,6,25]]}},"container-title":["2025 62nd ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11132383\/11132091\/11133324.pdf?arnumber=11133324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T19:47:39Z","timestamp":1774986459000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11133324\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":43,"aliases":["10.1109\/dac63849.2025.11133100"],"URL":"https:\/\/doi.org\/10.1109\/dac63849.2025.11133324","relation":{},"subject":[],"published":{"date-parts":[[2025,6,22]]}}}