{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:27:20Z","timestamp":1730276840525,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/isvdat.2015.7208048","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:53:11Z","timestamp":1440107591000},"page":"1-6","source":"Crossref","is-referenced-by-count":12,"title":["RTNA: Securing SOC architectures from confidentiality attacks at runtime using ART1 neural networks"],"prefix":"10.1109","author":[{"given":"Krishnendu","family":"Guha","sequence":"first","affiliation":[]},{"given":"Debasri","family":"Saha","sequence":"additional","affiliation":[]},{"given":"Amlan","family":"Chakrabarti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.200"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2147341"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2164908"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224990"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160627"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2169667"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2300635"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332154"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2012.2205997"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2012.2196252"},{"key":"ref27","first-page":"214","article-title":"VLSI Implementation of ART1 Memories. IEEE Transactions on Neural Networks","volume":"2","author":"tsay","year":"1991"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2013.2247460"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.21"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2061228"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2009.2029117"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093547"},{"year":"2005","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2012.6339145"},{"article-title":"Patent: CN 103198251 A-Hardware Trojan horse recognition method based on neural network","year":"2013","author":"chenxu","key":"ref22"},{"key":"ref21","first-page":"13","article-title":"Analysis of Secret Key Revealing Trojans for some Cryptocores","volume":"328","author":"guha","year":"2014","journal-title":"FICTA"},{"article-title":"Cryptography and Network Security","year":"0","author":"forouzan","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224320"},{"key":"ref26","article-title":"Neural Networks, Fuzzy Logic and Genetic Algorithm: Synthesis and Applications","author":"rajasekaran","year":"0","journal-title":"PHI Learning"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/2.33"}],"event":{"name":"2015 19th International Symposium on VLSI Design and Test (VDAT)","start":{"date-parts":[[2015,6,26]]},"location":"Ahmedabad, India","end":{"date-parts":[[2015,6,29]]}},"container-title":["2015 19th International Symposium on VLSI Design and Test"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7166536\/7208044\/07208048.pdf?arnumber=7208048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T22:20:02Z","timestamp":1490394002000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isvdat.2015.7208048","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}