{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:35:18Z","timestamp":1773246918529,"version":"3.50.1"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,1]]},"DOI":"10.1109\/iccad51958.2021.9643476","type":"proceedings-article","created":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T23:06:46Z","timestamp":1640300806000},"page":"1-9","source":"Crossref","is-referenced-by-count":33,"title":["UNTANGLE: Unlocking Routing and Logic Obfuscation Using Graph Neural Networks-based Link Prediction"],"prefix":"10.1109","author":[{"given":"Lilas","family":"Alrahis","sequence":"first","affiliation":[{"name":"New York University,Division of Engineering,Abu Dhabi,UAE"}]},{"given":"Satwik","family":"Patnaik","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University,Electrical &#x0026; Computer Engineering,College Station,Texas,USA"}]},{"given":"Muhammad Abdullah","family":"Hanif","sequence":"additional","affiliation":[{"name":"Institute of Computer Engineering, Technische Universit&#x00E4;t Wien,Vienna,Austria"}]},{"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[{"name":"New York University,Division of Engineering,Abu Dhabi,UAE"}]},{"given":"Ozgur","family":"Sinanoglu","sequence":"additional","affiliation":[{"name":"New York University,Division of Engineering,Abu Dhabi,UAE"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20591"},{"key":"ref38","first-page":"5171","article-title":"Link prediction based on graph neural networks","author":"zhang","year":"2018","journal-title":"Proceedings of the 32nd International Conference on Neural Information Processing Systems ser NIPS'18"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2968183"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2904838"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/731957"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/26.103045"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116197"},{"key":"ref35","article-title":"Secure scan and test using obfuscation throughout supply chain","author":"wang","year":"2017","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"ref34","author":"karmakar","year":"2018","journal-title":"Encrypt flip-flop A novel logic encryption technique for sequential circuits"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317831"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/prot.20865"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3057576"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203759"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3287624.3287693"},{"key":"ref16","first-page":"1","article-title":"ScanSAT: Unlocking static and dynamic scan obfuscation","author":"alrahis","year":"2019","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415669"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474039"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951805"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2021.3089555"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.284"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3431389"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2335155"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060458"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/978-3-642-14295-6_5","article-title":"ABC: An Academic Industrial-strength Verification Tool","author":"brayton","year":"2010","journal-title":"International Conference on Computer Aided Verification"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.193"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495588"},{"key":"ref2","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062226"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415667"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i1.97-122"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2018.8607163"},{"key":"ref21","first-page":"pp","article-title":"Removal attacks on logic locking and camouflaging techniques","volume":"99","author":"yasin","year":"2017","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"ref42","first-page":"1","article-title":"Drug response prediction as a link prediction problem","volume":"7","author":"stanfield","year":"2017","journal-title":"Scientific Reports"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714955"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(03)00009-1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST47458.2019.9006720"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3338508.3359576"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415668"},{"key":"ref43","article-title":"An end-to-end deep learning architecture for graph classification","volume":"32","author":"zhang","year":"2018","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2019.8702704"}],"event":{"name":"2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","location":"Munich, Germany","start":{"date-parts":[[2021,11,1]]},"end":{"date-parts":[[2021,11,4]]}},"container-title":["2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9643423\/9643432\/09643476.pdf?arnumber=9643476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:12:14Z","timestamp":1659485534000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9643476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,1]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/iccad51958.2021.9643476","relation":{},"subject":[],"published":{"date-parts":[[2021,11,1]]}}}