{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:15:47Z","timestamp":1775067347350,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545414","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"101-106","source":"Crossref","is-referenced-by-count":7,"title":["Covert Communication Channels Based On Hardware Trojans: Open-Source Dataset and AI-Based Detection"],"prefix":"10.1109","author":[{"given":"Al\u00e1n Rodrigo","family":"D\u00edaz-Rizo","sequence":"first","affiliation":[{"name":"Sorbonne Universit&#x00E9;, CNRS, LIP6,Paris,France"}]},{"given":"Abdelrahman Emad","family":"Abdelazim","sequence":"additional","affiliation":[{"name":"Sorbonne Universit&#x00E9;, CNRS, LIP6,Paris,France"}]},{"given":"Hassan","family":"Aboushady","sequence":"additional","affiliation":[{"name":"Sorbonne Universit&#x00E9;, CNRS, LIP6,Paris,France"}]},{"given":"Haralampos-G.","family":"Stratigopoulos","sequence":"additional","affiliation":[{"name":"Sorbonne Universit&#x00E9;, CNRS, LIP6,Paris,France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2238930"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36373-3_11"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346830"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680484"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.20"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2900906"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3218507"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10060647"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.21"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2633348"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2990792"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3241046"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9021079"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_27"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2021.3116806"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2018.8624705"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2015.7342386"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876142"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3165709"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3214111"},{"key":"ref22","first-page":"1","article-title":"IEEE standard for information technology-telecommunications and information exchange between systems local and metropolitan area networks-specific requirements - part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications","volume-title":"IEEE Std 802.11\u20132016 (Revision of IEEE Std 802.11-2012)","year":"2016"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Tysons Corner, VA, USA","start":{"date-parts":[[2024,5,6]]},"end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545414.pdf?arnumber=10545414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T17:42:09Z","timestamp":1742406129000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545414\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545414","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}