{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T21:08:53Z","timestamp":1771708133781,"version":"3.50.1"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1109\/host45689.2020.9300127","type":"proceedings-article","created":{"date-parts":[[2020,12,25]],"date-time":"2020-12-25T22:19:40Z","timestamp":1608934780000},"page":"1-12","source":"Crossref","is-referenced-by-count":26,"title":["A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection"],"prefix":"10.1109","author":[{"given":"Luong N.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Baki Berkay","family":"Yilmaz","sequence":"additional","affiliation":[]},{"given":"Milos","family":"Prvulovic","sequence":"additional","affiliation":[]},{"given":"Alenka","family":"Zajic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"0"},{"key":"ref38","year":"0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559039"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2013.2247460"},{"key":"ref30","article-title":"Hardware trojan designs on basys fpga board","author":"chen","year":"2008","journal-title":"Proc Embedded Syst Challenge Contest Cyber Secur Awareness Week-CSAW"},{"key":"ref37","year":"0"},{"key":"ref36","author":"cormen","year":"2009","journal-title":"Introduction to Algorithms"},{"key":"ref35","article-title":"Hardware trojan detection using backscattering side channel","author":"nguyen","year":"2019","journal-title":"Hardware-Oriented Security and Trust 2019 HOST 2019 IEEE International Workshop on"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2019.2894508"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2933441"},{"key":"ref40","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2906547"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559047"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICRMS.2014.7107361"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2424929"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0129-2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.263"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2354293"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.262"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2488495"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2812183"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2014.6783305"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660289"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2017.8031551"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2727985"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428081"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-016-5631-z"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISVDAT.2016.8064895"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/978-3-642-04138-9_26","article-title":"The state-of-the-art in ic reverse engineering","author":"torrance","year":"2009","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2627525"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-016-5581-5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2613842"},{"key":"ref21","first-page":"471","article-title":"Hardware trojan detection for gate-level ICs using signal correlation based clustering","author":"\ufffdakir","year":"2015","journal-title":"Proceedings of the 2015 Design Automation & Test in Europe Conference & Exhibition DATE '15"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2488495"},{"key":"ref24","article-title":"Defeating untrustworthy testing parties: A novel hybrid clustering ensemble based golden models-free hardware trojan detection method","author":"xue","year":"2018","journal-title":"IEEE Access"},{"key":"ref41","year":"0","journal-title":"Trusthub"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2016.7566609"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2016.7479228"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0001-6"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495568"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"}],"event":{"name":"2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"San Jose, CA, USA","start":{"date-parts":[[2020,12,7]]},"end":{"date-parts":[[2020,12,11]]}},"container-title":["2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9300124\/9300255\/09300127.pdf?arnumber=9300127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:36:59Z","timestamp":1656344219000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9300127\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/host45689.2020.9300127","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]}}}