{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:22:56Z","timestamp":1758273776081,"version":"3.41.0"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:00:00Z","timestamp":1745366400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:00:00Z","timestamp":1745366400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2139034"],"award-info":[{"award-number":["2139034"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,23]]},"DOI":"10.1109\/isqed65160.2025.11014429","type":"proceedings-article","created":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T17:43:30Z","timestamp":1748627010000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Obfuscation-Resistant Hardware Malware Detection: A Stacked Denoising Autoencoder Approach"],"prefix":"10.1109","author":[{"given":"Zhangying","family":"He","sequence":"first","affiliation":[{"name":"California State University, Long Beach,Department of Computer Engineering and Computer Science,Long Beach,CA,USA,90840"}]},{"given":"Chelsea William","family":"Fernandes","sequence":"additional","affiliation":[{"name":"California State University, Long Beach,Department of Computer Engineering and Computer Science,Long Beach,CA,USA,90840"}]},{"given":"Hossein","family":"Sayadi","sequence":"additional","affiliation":[{"name":"California State University, Long Beach,Department of Computer Engineering and Computer Science,Long Beach,CA,USA,90840"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3329786"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465828"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715080"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED60706.2024.10528369"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS56730.2022.9897507"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3313391"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5220\/0007834602110219"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37228-6_11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485894"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301176"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2023.3238678"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715057"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011919"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS48704.2020.9184539"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052999"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3386263.3407585"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS58744.2024.10558202"},{"key":"ref21","first-page":"1","article-title":"Numchecker: Detecting kernel control-flow modifying rootkits by using hardware performance counters","volume-title":"Design Automation Conference (DAC)","author":"Wang","year":"2013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196515"},{"key":"ref23","first-page":"1","article-title":"Adversarial attack on mi-croarchitectural events based malware detectors","volume-title":"Design Automation Conference (DAC)","author":"Dinakarrao","year":"2019"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00021"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00251"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS52814.2021.9486701"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_1"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3203217.3203264"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD50377.2020.00113"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3526241.3530326"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108394"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-024-00146-6"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424330"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD56317.2022.00042"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-71436-8_10"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3649329.3658252"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123972"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3026960"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-71436-8_12"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED54688.2022.9806150"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/BioCAS58349.2023.10388581"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED57927.2023.10129348"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.23919\/DATE58400.2024.10546665"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2010.85"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/8227751"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CISW.2007.4425615"},{"issue":"12","key":"ref47","article-title":"Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion","volume":"11","author":"Vincent","year":"2010","journal-title":"Journal of Machine Learning Res"},{"article-title":"pandas-dev\/pandas: Pandas","volume-title":"T. pandas development team","year":"2022","key":"ref48"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-92bf1922-00a"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066138"}],"event":{"name":"2025 26th International Symposium on Quality Electronic Design (ISQED)","start":{"date-parts":[[2025,4,23]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2025,4,25]]}},"container-title":["2025 26th International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11014297\/11014302\/11014429.pdf?arnumber=11014429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:56:59Z","timestamp":1748667419000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11014429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,23]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/isqed65160.2025.11014429","relation":{},"subject":[],"published":{"date-parts":[[2025,4,23]]}}}