{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T20:09:13Z","timestamp":1769285353478,"version":"3.49.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/iolts.2016.7604700","type":"proceedings-article","created":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T20:24:50Z","timestamp":1477340690000},"page":"203-206","source":"Crossref","is-referenced-by-count":135,"title":["Hardware Trojans classification for gate-level netlists based on machine learning"],"prefix":"10.1109","author":[{"given":"Kento","family":"Hasegawa","sequence":"first","affiliation":[]},{"given":"Masaru","family":"Oya","sequence":"additional","affiliation":[]},{"given":"Masao","family":"Yanagisawa","sequence":"additional","affiliation":[]},{"given":"Nozomu","family":"Togawa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0352"},{"key":"ref3","article-title":"A practical guide to support vector classification","author":"hsu","year":"2003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954998"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744878"},{"key":"ref11","article-title":"Trust-hub","year":"0"},{"key":"ref5","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"The Journal of Machine Learning Research"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593228"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516654"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660289"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"471","DOI":"10.7873\/DATE.2015.0365","article-title":"Hardware trojan detection for gate-level ics using signal correlation based clustering","author":"cakir","year":"2015","journal-title":"Proc Design Automation and Test in Europe (DATE)"}],"event":{"name":"2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS)","location":"Sant Feliu de Guixols, Spain","start":{"date-parts":[[2016,7,4]]},"end":{"date-parts":[[2016,7,6]]}},"container-title":["2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7589476\/7604654\/07604700.pdf?arnumber=7604700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T00:06:57Z","timestamp":1568506017000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7604700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/iolts.2016.7604700","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}