{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T11:29:32Z","timestamp":1763724572222,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1109\/tvlsi.2022.3143349","type":"journal-article","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T22:17:38Z","timestamp":1643667458000},"page":"515-525","source":"Crossref","is-referenced-by-count":12,"title":["Gradual-N-Justification (GNJ) to Reduce False-Positive Hardware Trojan Detection in Gate-Level Netlist"],"prefix":"10.1109","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4863-2934","authenticated-orcid":false,"given":"Hassan","family":"Salmani","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Howard University, Washington, DC, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-Asia51099.2020.00025"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.15"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-79081-7","volume-title":"Trusted Digital Circuits\u2014Hardware Trojan Vulnerabilities, Prevention and Detection","author":"Salmani","year":"2018"},{"volume-title":"The Hardware Trojan War","year":"2017","author":"Bhunia","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2488495"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2018.8624866"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2727985"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300127"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ITC44778.2020.9325222"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3126552"},{"key":"ref13","first-page":"471","article-title":"Hardware trojan detection for gate-level ICs using signal correlation based clustering","volume-title":"Proc. Design, Autom. Test Eur. Conf. Exhib. (DATE)","author":"\u00c7ak\u0131r"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050827"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS45731.2020.9180479"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2613842"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2015.7342386"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2016.7538895"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2015.7225334"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2354293"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-018-5726-9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2827699"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS50870.2020.9159740"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin.2018.8576247"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0001-6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342270"},{"volume-title":"Synopsys TetraMAX","year":"2021","key":"ref29"},{"volume-title":"Synopsys VCS","year":"2021","key":"ref30"},{"volume-title":"OpenCores","year":"2021","key":"ref31"},{"volume-title":"ISCAS","year":"2021","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/43.728919"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/92\/9739817\/09696303.pdf?arnumber=9696303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:01:20Z","timestamp":1705532480000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9696303\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4]]},"references-count":33,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2022.3143349","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"type":"print","value":"1063-8210"},{"type":"electronic","value":"1557-9999"}],"subject":[],"published":{"date-parts":[[2022,4]]}}}