{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T05:24:29Z","timestamp":1747373069978,"version":"3.37.3"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004750","name":"Aeronautical Science Foundation of China","doi-asserted-by":"publisher","award":["201943052001"],"award-info":[{"award-number":["201943052001"]}],"id":[{"id":"10.13039\/501100004750","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,13]]},"DOI":"10.1109\/icct52962.2021.9657930","type":"proceedings-article","created":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T20:36:39Z","timestamp":1641328599000},"page":"301-305","source":"Crossref","is-referenced-by-count":5,"title":["Hardware Trojan Detection Method for Gate-Level Netlists Based on the Idea of Few-Shot Learning"],"prefix":"10.1109","author":[{"given":"Tong","family":"Lu","sequence":"first","affiliation":[]},{"given":"Fang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Fen","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Benjun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A Side Channel Based Power Analysis Technique for Hardware Trojan Detection using Statistical Learning Approach","author":"roshni","year":"0","journal-title":"IFIP International Conference on Wireless and Optical Communications Networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICRMS.2014.7107362"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116264"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2012.24"},{"key":"ref14","first-page":"257","article-title":"Efficient Solution for Misalignment of Signal in Side Channel Analysis","author":"thanh-ha","year":"0","journal-title":"2007 IEEE International Conference on Acoustics Speech and Signal Processing - ICASSP"},{"key":"ref15","first-page":"1","article-title":"Single-Triggered Hardware Trojan Identification Based on Gate-Level Circuit Structural Characteristics","author":"fuqiang","year":"0","journal-title":"2017 IEEE International Symposium on Circuits and Systems (ISCAS)"},{"key":"ref16","first-page":"364","article-title":"Hardware Trojan State Detection for Analog Circuits and Systems","author":"yen-ting","year":"0","journal-title":"National Aerospace and Electronics Conference Proceedings of the IEEE"},{"key":"ref17","first-page":"443","article-title":"An Anti-Trojans Design Approach Based on Activation Probability Analysis","author":"xuwei","year":"0","journal-title":"Proceedings of the 2015 IEEE International Conference on Electron Devices and Solid-State Circuits EDSSC"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2019EAP1044"},{"key":"ref19","first-page":"203","article-title":"Hardware Trojans Classification for Gate- Level Netlists Based on Machine Learning","author":"kento","year":"0","journal-title":"2016 IEEE 22nd International Symposium on on-Line Testing and Robust System Design IOLTS"},{"key":"ref4","first-page":"79","article-title":"Grey Zone in Pre-Silicon Hardware Trojan Detection","author":"jing","year":"0","journal-title":"2018 IEEE International Test Conference in Asia (ITC-Asia)"},{"key":"ref3","first-page":"152","article-title":"In-situ Trojan authentication for invalidating hardware-Trojan functions","author":"oya","year":"0","journal-title":"Proceedings International Symposium on Quality Electronic Design ISQED-02"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2633348"},{"key":"ref5","first-page":"69","article-title":"A Hardware-Trojans Detection Approach Based on eXtreme Gradient Boosting","author":"jinghui","year":"0","journal-title":"2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)"},{"key":"ref8","first-page":"80","article-title":"Hardware Trojan Detection Based on Signal Correlation","author":"wei","year":"0","journal-title":"Proceedings of the Asian Test Symposium"},{"key":"ref7","first-page":"1","article-title":"Targeting Hardware Trojans in Mixed-Signal Circuits for Security","author":"sabyasachi","year":"0","journal-title":"2016 IEEE 21st International Mixed-Signal Testing Workshop (IMSTW)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2018.8355314"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2012.42"},{"key":"ref20","first-page":"1","article-title":"Trojan-Feature Extraction at Gate-Level Netlists and its Application to Hardware-Trojan Detection using Random Forest Classifier","author":"kento","year":"0","journal-title":"2017 IEEE International Symposium on Circuits and Systems"},{"journal-title":"Trust-HUB","year":"0","key":"ref22"},{"key":"ref21","first-page":"1","article-title":"Generalizing from a Few Examples: A Survey on Few-shot learning","author":"yaqing","year":"2020","journal-title":"ACM Computing Surveys"}],"event":{"name":"2021 IEEE 21st International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2021,10,13]]},"location":"Tianjin, China","end":{"date-parts":[[2021,10,16]]}},"container-title":["2021 IEEE 21st International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9657830\/9657831\/09657930.pdf?arnumber=9657930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:56:22Z","timestamp":1652201782000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9657930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icct52962.2021.9657930","relation":{},"subject":[],"published":{"date-parts":[[2021,10,13]]}}}