{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:32:44Z","timestamp":1775079164857,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61832018"],"award-info":[{"award-number":["61832018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Planning Project of Hunan Province","award":["2019RS2027"],"award-info":[{"award-number":["2019RS2027"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1109\/tcad.2020.2977069","type":"journal-article","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T22:39:41Z","timestamp":1582929581000},"page":"4496-4509","source":"Crossref","is-referenced-by-count":23,"title":["Novel Design Strategy Toward A2 Trojan Detection Based on Built-In Acceleration Structure"],"prefix":"10.1109","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5817-1908","authenticated-orcid":false,"given":"Ding","family":"Deng","sequence":"first","affiliation":[]},{"given":"Yaohua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Guo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"1","article-title":"How secure is split manufacturing in preventing hardware trojan?","author":"chen","year":"2016","journal-title":"Proc IEEE Asian Hardw Orient Security Trust (AsianHOST)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898104"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.261"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855559"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740833"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559037"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681643"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2013.6691167"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559048"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2474373"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2017.7995258"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062336"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927268"},{"key":"ref28","year":"2005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2017.7969511"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2017.7968235"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"ref29","first-page":"837","article-title":"Robust techniques for watermarking sequential circuit designs","author":"oliveira","year":"1999","journal-title":"Proc Design Autom Conf"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2015.7256167"},{"key":"ref7","first-page":"51","article-title":"Hardware trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"Proc IEEE Int Workshop Hardw -Orient Secur Trust"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4505310"},{"key":"ref9","first-page":"1","article-title":"Hardware trojan detection through golden chip-free statistical side-channel fingerprinting","author":"liu","year":"2014","journal-title":"Proc 51st ACM\/EDAC\/IEEE Design Autom Conf (DAC)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.10"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714906"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383914"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2018.8494850"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.18"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2864246"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IITSI.2010.74"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1980.1585245"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/9265421\/09018186.pdf?arnumber=9018186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:06:26Z","timestamp":1651068386000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9018186\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":34,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2020.2977069","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"value":"0278-0070","type":"print"},{"value":"1937-4151","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]}}}