{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T20:31:40Z","timestamp":1775334700270,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,7]]},"DOI":"10.1109\/isqed51717.2021.9424362","type":"proceedings-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:09:51Z","timestamp":1620691791000},"page":"414-419","source":"Crossref","is-referenced-by-count":33,"title":["Application of Machine Learning in Hardware Trojan Detection"],"prefix":"10.1109","author":[{"given":"Shamik","family":"Kundu","sequence":"first","affiliation":[]},{"given":"Xingyu","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Kanad","family":"Basu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"ref38","first-page":"471","article-title":"Hardware trojan detection for gate-level ics using signal correlation based clustering","author":"cakir","year":"2015","journal-title":"2015 Design Automation & Test in Europe Conference & Exhibition (DATE)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2827699"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495568"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2017.8046227"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2016.7604700"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2613842"},{"key":"ref36","first-page":"1","article-title":"Hardware trojan detection through golden chip-free statistical side-channel fingerprinting","author":"liu","year":"2014","journal-title":"Proceedings of the 51st Annual Design Automation Conference"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2016.7835553"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150466"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317762"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2016.2638442"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050827"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2016.7479228"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1958.tb00292.x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1883"},{"key":"ref18","first-page":"100","article-title":"Algorithm as 136: A k-means clustering algorithm","volume":"28","author":"hartigan","year":"1979","journal-title":"Journal of the Royal Statistical Society Series C (Applied Statistics)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2017.8242063"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2017.36"},{"key":"ref27","first-page":"2790","article-title":"A novel hardware trojan detection based on bp neural network","author":"li","year":"2016","journal-title":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4505310"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2633348"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-018-5726-9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.223"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics7070124"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0001-6"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2012.2196252"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/widm.8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1995.598994"},{"key":"ref21","author":"quinlan","year":"2014","journal-title":"C4 5 Programs for Machine Learning"},{"key":"ref24","author":"hassoun","year":"1995","journal-title":"Fundamentals of Artificial Neural Networks"},{"key":"ref23","article-title":"Fast anomaly detection for streaming data","author":"tan","year":"2011","journal-title":"Twenty-Second International Joint Conference on Artificial Intelligence"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2015.7398569"},{"key":"ref25","first-page":"965","article-title":"Post-deployment trust evaluation in wireless cryptographic ics","author":"jin","year":"2012","journal-title":"2012 Design Automation & Test in Europe Conference & Exhibition (DATE)"}],"event":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","location":"Santa Clara, CA, USA","start":{"date-parts":[[2021,4,7]]},"end":{"date-parts":[[2021,4,9]]}},"container-title":["2021 22nd International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424228\/9424248\/09424362.pdf?arnumber=9424362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:41:21Z","timestamp":1652197281000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9424362\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/isqed51717.2021.9424362","relation":{},"subject":[],"published":{"date-parts":[[2021,4,7]]}}}