{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:21:48Z","timestamp":1770218508182,"version":"3.49.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2011,3,1]],"date-time":"2011-03-01T00:00:00Z","timestamp":1298937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1109\/tifs.2010.2096811","type":"journal-article","created":{"date-parts":[[2010,12,10]],"date-time":"2010-12-10T15:34:40Z","timestamp":1291995280000},"page":"162-174","source":"Crossref","is-referenced-by-count":102,"title":["A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection"],"prefix":"10.1109","volume":"6","author":[{"given":"Farinaz","family":"Koushanfar","sequence":"first","affiliation":[]},{"given":"Azalia","family":"Mirhoseini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1840845.1840900"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2010.5690094"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1145\/1278480.1278547","article-title":"cad-based security, cryptography, and digital rights management","author":"koushanfar","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-3-540-88961-8_8","article-title":"trusted integrated circuits: a nondestructive hidden characteristics extraction approach","author":"alkabani","year":"2008","journal-title":"Proc Information Hiding (IH) Conf"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.9"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281239"},{"key":"ref35","first-page":"1650","article-title":"near-optimal observation selection using submodular functions","volume":"2","author":"krause","year":"2007","journal-title":"Proc Nat Conf Artificial Intelligence (AAAI)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513122"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687426"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1145\/1837274.1837332","article-title":"gate-level characterization: foundations and hardware security applications","author":"wei","year":"2010","journal-title":"Proc Design Automation Conf (DAC)"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-642-04431-1_16","article-title":"svd-based ghost circuitry detection","author":"nelson","year":"2009","journal-title":"Proc Information Hiding (IH) Conf"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2010.5653770"},{"key":"ref14","first-page":"817","article-title":"a general framework for spatial correlation modeling in vlsi design","author":"liu","year":"2007","journal-title":"Proc Design Automation Conf (DAC)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VTEST.2000.843863"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511816321"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2000.894227"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/989995.989997"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/12.543707"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1393921.1394011"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"ref27","first-page":"8","article-title":"at-speed delay characterization for ic authentication and trojan horse detection","author":"li","year":"2008","journal-title":"Proc Int Symp Hardware Oriented Security and Trust (HOST)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681643"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681572"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559037"},{"key":"ref8","first-page":"51","article-title":"hardware trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"Proc Int Symp Hardware Oriented Security and Trust (HOST)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1366110.1366196"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"688","DOI":"10.1145\/1629911.1630091","article-title":"hardware trojan horse detection using gate-level characterization","author":"potkonjak","year":"2009","journal-title":"2009 46th ACM\/IEEE Design Automation Conference dac"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837435"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-16435-4_2","article-title":"a unified submodular framework for multimodal ic trojan detection","author":"koushanfar","year":"2010","journal-title":"Proc Information Hiding (IH) Conf"},{"key":"ref22","author":"kreinovich","year":"1997","journal-title":"Computational Complexity and Feasibility of Data Processing and Interval Computations"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2002.800644"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/285055.285059"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF01588971"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559047"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2007.895613"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/5712892\/05657256.pdf?arnumber=5657256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T02:43:06Z","timestamp":1636944186000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5657256\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":37,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2010.2096811","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3]]}}}