{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T13:54:15Z","timestamp":1764251655023},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1109\/iscas45731.2020.9180407","type":"proceedings-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T13:22:27Z","timestamp":1601385747000},"page":"1-5","source":"Crossref","is-referenced-by-count":8,"title":["Low-Cost Remarked Counterfeit IC Detection using LDO Regulators"],"prefix":"10.1109","author":[{"given":"Sreeja","family":"Chowdhury","sequence":"first","affiliation":[{"name":"Florida Institute of Cybersecurity Research, University of Florida"}]},{"given":"Fatehmeh","family":"Ganji","sequence":"additional","affiliation":[{"name":"Florida Institute of Cybersecurity Research, University of Florida"}]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"Florida Institute of Cybersecurity Research, University of Florida"}]}],"member":"263","reference":[{"article-title":"Electronics counterfeiters get their day in court","year":"2016","author":"cairns","key":"ref4"},{"year":"2015","key":"ref3","article-title":"New york man admits supplying falsely remarked computer chips used in u.s. military helicopters"},{"key":"ref10","first-page":"513","article-title":"Neighbourhood components analysis","author":"goldberger","year":"2005","journal-title":"Advances in neural information processing systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2860953"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2018.8624679"},{"journal-title":"version 9 4 0 (R2018a)","year":"2018","key":"ref11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ITC44170.2019.9000118"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6849-3"},{"article-title":"Ldo basics: Chapter 1 dropout","year":"0","author":"paxton","key":"ref7"},{"article-title":"Faked parts detection","year":"2010","author":"kessler","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.11.024"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-013-5430-8"}],"event":{"name":"2020 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2020,10,12]]},"location":"Seville, Spain","end":{"date-parts":[[2020,10,14]]}},"container-title":["2020 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9179985\/9180369\/09180407.pdf?arnumber=9180407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T21:05:13Z","timestamp":1705352713000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9180407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iscas45731.2020.9180407","relation":{},"subject":[],"published":{"date-parts":[[2020,10]]}}}