{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:57:29Z","timestamp":1763704649389,"version":"3.45.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100016311","name":"Arm","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016311","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016311","name":"Arm","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016311","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,26]]},"DOI":"10.1109\/iccad66269.2025.11241012","type":"proceedings-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:39:34Z","timestamp":1763663974000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Designing with Deception: ML- and Covert Gate-Enhanced Camouflaging to Thwart IC Reverse Engineering"],"prefix":"10.1109","author":[{"given":"Junling","family":"Fan","sequence":"first","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering,Gainesville,USA"}]},{"given":"David","family":"Koblah","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering,Gainesville,USA"}]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering,Gainesville,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2755563"},{"key":"ref2","first-page":"333","article-title":"The state-of-the-art in semiconductor reverse engineering","volume-title":"Proceedings of the 48th Design Automation Conference","author":"Torrance"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3342099"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2602554"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516656"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3337772"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2019.i3.86-118"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1985.6313354"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2488495"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3073855"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15334-2_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2926478"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690251"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203759"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714924"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300258"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3676536.3676822"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495587"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2015.118"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2652220"},{"article-title":"Auto-encoding variational bayes","year":"2013","author":"Kingma","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"article-title":"Vae explainer: Supplement learning variational autoencoders with interactive visualization","year":"2024","author":"Bertucci","key":"ref23"},{"article-title":"Cyber deception: State of the art, trends and open challenges","year":"2024","author":"L\u00f3pez","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2018.2879878"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3676536.3676687"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530410"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643581"},{"article-title":"Variational graph auto-encoders","year":"2016","author":"Kipf","key":"ref29"},{"article-title":"D-vae: A variational autoencoder for directed acyclic graphs","year":"2019","author":"Zhang","key":"ref30"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.3115\/v1\/D14-1179","article-title":"Learning phrase representations using rnn encoder-decoder for statistical machine translation","author":"Cho","year":"2014"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3110807"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/54.785838"},{"article-title":"The epfl combinational benchmark suite","volume-title":"Proceedings of the 24th International Workshop on Logic & Synthesis (IWLS)","author":"Amar\u00fa","key":"ref34"},{"article-title":"Deep graph library: A graph-centric, highly-performant package for graph neural networks","year":"2019","author":"Wang","key":"ref35"},{"key":"ref36","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"Paszke","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.25080\/TCWV9851"},{"article-title":"Graph-saint: Graph sampling based inductive learning method","year":"2020","author":"Zeng","key":"ref38"}],"event":{"name":"2025 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","start":{"date-parts":[[2025,10,26]]},"location":"Munich, Germany","end":{"date-parts":[[2025,10,30]]}},"container-title":["2025 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11240608\/11240621\/11241012.pdf?arnumber=11241012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:47:35Z","timestamp":1763704055000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11241012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,26]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/iccad66269.2025.11241012","relation":{},"subject":[],"published":{"date-parts":[[2025,10,26]]}}}