{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:20:45Z","timestamp":1755998445084,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/hst.2018.8383895","type":"proceedings-article","created":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T23:36:11Z","timestamp":1529019371000},"page":"89-95","source":"Crossref","is-referenced-by-count":19,"title":["Independent detection of recycled flash memory: Challenges and solutions"],"prefix":"10.1109","author":[{"given":"Preeti","family":"Kumari","sequence":"first","affiliation":[]},{"given":"B. M. S. Bahar","family":"Talukder","sequence":"additional","affiliation":[]},{"given":"Sadman","family":"Sakib","sequence":"additional","affiliation":[]},{"given":"Biswajit","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Md Tauhidur","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495581"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2777262"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2582830"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2015.2466551"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/VLSIT.2017.7998211"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2582830"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951827"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SMACD.2017.7981561"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858347"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2409267"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2013.6569368"},{"year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2014.6962096"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/NATW.2014.17"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49019-9_6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2016.2638439"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334837"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062249"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593102"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6699051"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2015.7085470"},{"key":"ref24","article-title":"Counter-feit Electronics Detection Using Image Processing and Machine Learning","volume":"787","author":"navid","year":"2017","journal-title":"Journal of Physics Conference Series"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378191"}],"event":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2018,4,30]]},"location":"Washington, DC","end":{"date-parts":[[2018,5,4]]}},"container-title":["2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8369415\/8383882\/08383895.pdf?arnumber=8383895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T01:31:27Z","timestamp":1530581487000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8383895\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/hst.2018.8383895","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}