{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:08:44Z","timestamp":1765544924944,"version":"3.37.3"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"publisher","award":["2021YFB3100900"],"award-info":[{"award-number":["2021YFB3100900"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62074131"],"award-info":[{"award-number":["62074131"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities of China","doi-asserted-by":"publisher","award":["2662022XXYJ005"],"award-info":[{"award-number":["2662022XXYJ005"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,28]]},"DOI":"10.1109\/iccad57390.2023.10323915","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T18:58:45Z","timestamp":1701370725000},"page":"1-9","source":"Crossref","is-referenced-by-count":6,"title":["Automated Hardware Trojan Detection at LUT Using Explainable Graph Neural Networks"],"prefix":"10.1109","author":[{"given":"Lingjuan","family":"Wu","sequence":"first","affiliation":[{"name":"College of Informatics, Huazhong Agricultural University,Wuhan,China,430070"}]},{"given":"Hao","family":"Su","sequence":"additional","affiliation":[{"name":"School of Cybersecurity, Northwestern Polytechnical University,Xi&#x0027;an,China,710072"}]},{"given":"Xuelin","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Informatics, Huazhong Agricultural University,Wuhan,China,430070"}]},{"given":"Yu","family":"Tai","sequence":"additional","affiliation":[{"name":"School of Cybersecurity, Northwestern Polytechnical University,Xi&#x0027;an,China,710072"}]},{"given":"Han","family":"Li","sequence":"additional","affiliation":[{"name":"College of Informatics, Huazhong Agricultural University,Wuhan,China,430070"}]},{"given":"Wei","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Cybersecurity, Northwestern Polytechnical University,Xi&#x0027;an,China,710072"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/978-3-642-40349-1_12"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/978-3-642-33027-8_2"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TCSII.2021.3074549"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/3229050"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/s10836-018-5739-4"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ASP-DAC47756.2020.9045449"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TCAD.2015.2488495"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2508859.2516654"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TCAD.2015.2422836"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2897937.2897992"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.23919\/DATE.2017.7927266"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/MC.2016.225"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TIFS.2017.2707323"},{"key":"ref14","article-title":"Automatic hardware Trojan insertion using machine learning","author":"Cruz","year":"2022","journal-title":"arXiv preprint"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ISCAS.2019.8702493"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/IOLTS.2017.8046227"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIFS.2016.2613842"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ISCAS.2019.8702479"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/HLDVT.2017.8167465"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/j.aiopen.2021.01.001"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TCAD.2022.3178355"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TVLSI.2010.2093547"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-642-04138-9_28"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/HOST49136.2021.9702278"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/ICCD50377.2020.00113"},{"key":"ref26","first-page":"496","article-title":"Hardware Trojan detection using Shapley ensemble boosting","volume-title":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","author":"Pan"},{"key":"ref27","first-page":"6666","article-title":"Generative causal explanations for graph neural networks","volume-title":"International Conference on Machine Learning","author":"Lin"},{"key":"ref28","first-page":"3734","article-title":"Self-attention graph pooling","volume-title":"International Conference on Machine Learning","author":"Lee"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/CVPR.2019.00949"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/AsianHOST.2018.8607172"}],"event":{"name":"2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)","start":{"date-parts":[[2023,10,28]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,11,2]]}},"container-title":["2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10323590\/10323543\/10323915.pdf?arnumber=10323915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T22:15:57Z","timestamp":1709417757000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10323915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,28]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iccad57390.2023.10323915","relation":{},"subject":[],"published":{"date-parts":[[2023,10,28]]}}}