{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T00:40:25Z","timestamp":1771029625661,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1718570"],"award-info":[{"award-number":["CCF-1718570"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Toshiba Memory Corporation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/tcad.2018.2864251","type":"journal-article","created":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T19:09:11Z","timestamp":1533668951000},"page":"1900-1913","source":"Crossref","is-referenced-by-count":45,"title":["Data Efficient Lithography Modeling With Transfer Learning and Active Data Selection"],"prefix":"10.1109","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0977-2774","authenticated-orcid":false,"given":"Yibo","family":"Lin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7212-2264","authenticated-orcid":false,"given":"Meng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuki","family":"Watanabe","sequence":"additional","affiliation":[]},{"given":"Taiki","family":"Kimura","sequence":"additional","affiliation":[]},{"given":"Tetsuaki","family":"Matsunawa","sequence":"additional","affiliation":[]},{"given":"Shigeki","family":"Nojima","sequence":"additional","affiliation":[]},{"given":"David Z.","family":"Pan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/72.822506"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.02.001"},{"key":"ref31","article-title":"Adversarial feature learning","volume":"abs 1605 9782","author":"donahue","year":"2016","journal-title":"CoRR"},{"key":"ref30","first-page":"1870","article-title":"Active nearest neighbors in changing environments","author":"berlind","year":"2015","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref37","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref36","article-title":"Provably secure camouflaging strategy for IC protection","author":"li","year":"0","journal-title":"IEEE Trans Comput -Aided Design Integr Circuits Syst"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2429384.2429420"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2010.5653806"},{"key":"ref28","article-title":"Active learning for convolutional neural networks: A core-set approach","author":"sener","year":"2018","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref29","first-page":"45","article-title":"Support vector machine active learning with applications to text classification","volume":"2","author":"tong","year":"2001","journal-title":"J Mach Learn Res"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIT.2016.7573398"},{"key":"ref1","article-title":"The daunting complexity of scaling to 7NM without EUV: Pushing DTCO to the extreme","volume":"9427","author":"liebmann","year":"2015","journal-title":"Proc SPIE"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1117\/1.JMM.15.2.021009"},{"key":"ref22","article-title":"Sub-resolution assist feature (SRAF) printing prediction using logistic regression","author":"tan","year":"2015","journal-title":"Proc SPIE"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2748029"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1147\/rd.455.0651"},{"key":"ref23","year":"2008","journal-title":"Calibre Verification User Manual"},{"key":"ref26","article-title":"Progressive neural networks","author":"rusu","year":"2016","journal-title":"ArXiv e-prints"},{"key":"ref25","first-page":"3834","article-title":"Grounded action transformation for robot learning in simulation","author":"hanna","year":"2017","journal-title":"Proc AAAI"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1117\/1.JMM.15.4.043507"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1117\/1.JMM.16.3.033504"},{"key":"ref40","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","author":"glorot","year":"2010","journal-title":"Proc 13th Int Conf Artif Intell Stat"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062270"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC.2017.8226047"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3036669.3036673"},{"key":"ref15","article-title":"Machine learning for mask\/wafer hotspot detection and mask synthesis","volume":"10451","author":"lin","year":"2017","journal-title":"Proc Photomask Technol"},{"key":"ref16","article-title":"Bridging the gap between layout pattern sampling and hotspot detection via batch active learning","author":"yang","year":"2018","journal-title":"ArXiv e-prints"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSM.2008.2000283"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1088\/2040-8978\/12\/4\/045601"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1088\/2040-8978\/15\/7\/075708"},{"key":"ref4","article-title":"Accurate lithography simulation model based on convolutional neural networks","author":"watanabe","year":"2017","journal-title":"Proc SPIE Adv Lithography"},{"key":"ref3","article-title":"Machine learning-based resist 3D model","volume":"10147","author":"shim","year":"2017","journal-title":"Proc SPIE"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1117\/12.879546"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1364\/AO.56.006485"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1117\/1.JMM.15.4.043504"},{"key":"ref7","article-title":"Automatic layout feature extraction for lithography hotspot detection based on deep neural network","volume":"9781","author":"matsunawa","year":"2016","journal-title":"Proc SPIE"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3177540.3178242"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967032"},{"key":"ref46","author":"abadi","year":"2015","journal-title":"TensorFlow Large-Scale Machine Learning on Heterogeneous Systems"},{"key":"ref45","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref48","article-title":"Adam: A method for stochastic optimization","volume":"abs 1412 6980","author":"kingma","year":"2014","journal-title":"CoRR"},{"key":"ref47","year":"2016","journal-title":"Sentaurus Lithography"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316801.ch2"},{"key":"ref41","first-page":"564","article-title":"K-medoids clustering","author":"jin","year":"2010","journal-title":"Encyclopedia of Machine Learning"},{"key":"ref44","first-page":"1027","article-title":"k-means++: The advantages of careful seeding","author":"arthur","year":"2007","journal-title":"Proc 18th Annu ACM-SIAM Symp Discr Algorithms"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.01.039"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/43\/8844133\/8428441-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/8844133\/08428441.pdf?arnumber=8428441","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:57:28Z","timestamp":1657745848000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8428441\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":49,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2018.2864251","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"value":"0278-0070","type":"print"},{"value":"1937-4151","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}