{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T13:57:18Z","timestamp":1758808638323,"version":"3.37.3"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2245247"],"award-info":[{"award-number":["2245247"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,28]]},"DOI":"10.1109\/iccad57390.2023.10323655","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T18:58:45Z","timestamp":1701370725000},"page":"01-09","source":"Crossref","is-referenced-by-count":7,"title":["Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection"],"prefix":"10.1109","author":[{"given":"Rahul","family":"Vishwakarma","sequence":"first","affiliation":[{"name":"California State University Long Beach,Computer Engineering &#x0026; Computer Science Department,Long Beach,CA,USA"}]},{"given":"Amin","family":"Rezaei","sequence":"additional","affiliation":[{"name":"California State University Long Beach,Computer Engineering &#x0026; Computer Science Department,Long Beach,CA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.1101"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2668322.2668325"},{"volume-title":"Spotting the differences: Quirks of machine learning (in) security","year":"2023","author":"Ceschin","key":"ref3"},{"article-title":"Dos and donts of machine learning in computer security","volume-title":"31 st USENIX Security Symposium (USENIX Security 22), USENIX Association","author":"Quiring","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2021.3084400"},{"issue":"3","key":"ref6","article-title":"A tutorial on conformal prediction","volume":"9","author":"Shafer","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref7","article-title":"Conformal prediction under covariate shift","volume":"32","author":"Tibshirani","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3579823"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3589506"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424362"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3464959"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3531010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/iSES54909.2022.00159"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2014.6783305"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E100.A.1427"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719888098"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050827"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560690"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3544015"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3508352.3561096","article-title":"Embracing graph neural networks for hardware security","volume-title":"Proceedings of the 41st IEEE\/ACM International Conference on Computer-Aided Design","author":"Alrahis","year":"2022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774760"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2019.8702479"},{"key":"ref24","first-page":"2327","article-title":"Cade: Detecting and explaining concept drift samples for security applications","volume-title":"USENIX security symposium","author":"Yang","year":"2021"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1145\/3566097.3567920","article-title":"Hardware trojan detection using shapley ensemble boosting","volume-title":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","author":"Pan","year":"2023"},{"key":"ref26","first-page":"3469","article-title":"Deepreflect: Discovering malicious functionality through binary reconstruction","volume-title":"USENIX Security Symposium","author":"Downing","year":"2021"},{"key":"ref27","first-page":"1487","article-title":"Explanation-guided back-door poisoning attacks against malware classifiers","volume-title":"USENIX Security Symposium","author":"Severi","year":"2021"},{"key":"ref28","article-title":"Can you trust your models uncer-tainty? evaluating predictive uncertainty under dataset shift","volume":"32","author":"Ovadia","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-150786"},{"key":"ref30","first-page":"24","article-title":"Mondrian conformal predictive distributions","author":"Bostr\u00f6m","year":"2021","journal-title":"Conformal and Probabilistic Prediction and Applications"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1561\/2200000101"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/514161a"},{"volume-title":"Anomaly aware log retrieval from disk array enclosures (daes)","year":"2022","author":"Liu","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-019-01592-4"},{"volume-title":"Box2d","year":"2010","author":"Catto","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1482"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3431389"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02345"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00976"},{"key":"ref41","article-title":"Modeling tabular data using conditional gan","volume":"32","author":"Xu","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref42","article-title":"Decentralized learning of generative adversarial networks from non-iid data","author":"Yonetani","year":"2019","journal-title":"arXiv preprint"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/BF01013465"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1176997031"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2018p0256"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8741031"},{"volume-title":"Trust-hub trojan benchmark for hardware trojan detection model creation using machine learning","year":"2022","author":"Salmani","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11020245"},{"journal-title":"Semantic uncertainty intervals for disentangled latent spaces","author":"Sankaranarayanan","key":"ref49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3478535"},{"key":"ref51","article-title":"Why model why? assessing the strengths and limitations of lime","author":"Dieber","year":"2020","journal-title":"arXiv preprint"},{"key":"ref52","doi-asserted-by":"crossref","DOI":"10.1145\/3508352.3549425","article-title":"Evaluating the security of efpga-based redaction algorithms","volume-title":"IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)","author":"Rezaei","year":"2022"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/HOST54066.2022.9840128"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED57927.2023.10129368"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3583781.3590219"}],"event":{"name":"2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)","start":{"date-parts":[[2023,10,28]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,11,2]]}},"container-title":["2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10323590\/10323543\/10323655.pdf?arnumber=10323655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T21:09:30Z","timestamp":1710364170000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10323655\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,28]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/iccad57390.2023.10323655","relation":{},"subject":[],"published":{"date-parts":[[2023,10,28]]}}}