{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T07:04:47Z","timestamp":1751094287031,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/icecs58634.2023.10382775","type":"proceedings-article","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T19:38:25Z","timestamp":1704915505000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Hiding from Hardware Trojan Detectors by Avoiding Rare Events"],"prefix":"10.1109","author":[{"given":"Mattis","family":"Hasler","sequence":"first","affiliation":[{"name":"Barkhausen Institut,Dresden,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2015.7169073"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3019984"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI54635.2022.00042"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401143"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/800139.804528"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-00816-5_2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-018-5739-4"},{"key":"ref9","first-page":"408","article-title":"Automated test generation for hardware trojan detection using reinforcement learning","volume-title":"Proceedings of the 26th Asia and South Pacific Design Automation Conference","author":"Pan"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151378"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00034"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-020-00100-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2019EAP1044"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2748021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581574"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/cds2.12088"},{"article-title":"Opencores.org tiny_aes","year":"2013","author":"Hsing","key":"ref17"},{"volume-title":"Yosys open synthesis suite","year":"2016","author":"Wolf","key":"ref18"},{"issue":"99","key":"ref19","first-page":"3","article-title":"Icarus verilog: Open-source verilog more than a year later","volume":"2002","author":"Williams","year":"2002","journal-title":"Linux Journal"}],"event":{"name":"2023 30th IEEE International Conference on Electronics, Circuits and Systems (ICECS)","start":{"date-parts":[[2023,12,4]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2023,12,7]]}},"container-title":["2023 30th IEEE International Conference on Electronics, Circuits and Systems (ICECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10382705\/10382711\/10382775.pdf?arnumber=10382775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T18:21:20Z","timestamp":1705170080000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10382775\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icecs58634.2023.10382775","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}