{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:30:51Z","timestamp":1759365051617,"version":"build-2065373602"},"reference-count":12,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"Key-Area Research and Development Program of Guangdong Province","doi-asserted-by":"publisher","award":["2023B0303030004"],"award-info":[{"award-number":["2023B0303030004"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62334014"],"award-info":[{"award-number":["62334014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tvlsi.2025.3569219","type":"journal-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T13:54:59Z","timestamp":1748958899000},"page":"2639-2643","source":"Crossref","is-referenced-by-count":0,"title":["A Low-Cost Secure Branch Predictor to Mitigate the Speculative Attacks by Disrupting Setup Phase"],"prefix":"10.1109","volume":"33","author":[{"given":"Runye","family":"Ding","sequence":"first","affiliation":[{"name":"School of Microelectronics Science and Technology, Sun Yat-sen University, Guangzhou, China"}]},{"given":"Yuyang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Microelectronics Science and Technology, Sun Yat-sen University, Guangzhou, China"}]},{"given":"Yujie","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Microelectronics Science and Technology, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2719-4055","authenticated-orcid":false,"given":"Yao","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Microelectronics Science and Technology, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8802-0457","authenticated-orcid":false,"given":"Zhiyi","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Microelectronics Science and Technology, Sun Yat-sen University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179355"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3637662"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3171810"},{"key":"ref4","first-page":"723","article-title":"Efficient invisible speculative execution through selective delay and value prediction","volume-title":"Proc. ACM\/IEEE 46th Annu. Int. Symp. Comput. Archit. (ISCA)","author":"Sakalis"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2020.2985359"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358314"},{"key":"ref7","first-page":"1","article-title":"SafeSpec: Banishing the spectre of a meltdown with leakage-free speculation","volume-title":"Proc. 56th ACM\/IEEE Design Autom. Conf. (DAC)","author":"Khasawneh"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00058"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586178"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC52403.2022.9712481"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00016"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/92\/11181096\/11021576.pdf?arnumber=11021576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T05:11:24Z","timestamp":1759295484000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11021576\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":12,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2025.3569219","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"type":"print","value":"1063-8210"},{"type":"electronic","value":"1557-9999"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}