{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:08:58Z","timestamp":1777043338330,"version":"3.51.4"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,1]]},"DOI":"10.1109\/vdat63601.2024.10705727","type":"proceedings-article","created":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T17:45:58Z","timestamp":1728495958000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A Dynamic Window Size-Based VLSI Architecture Design of Moving Average Filter and Its Vulnerability to Hardware Trojans"],"prefix":"10.1109","author":[{"given":"Moitreya","family":"Chaudhury","sequence":"first","affiliation":[{"name":"Indian Institute of Engineering Science and Technology,Electronics and Telecommunication,Howrah,India"}]},{"given":"Binit Kumar","family":"Pandit","sequence":"additional","affiliation":[{"name":"Indian Institute of Engineering Science and Technology,Electronics and Telecommunication,Howrah,India"}]},{"given":"Ayan","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Indian Institute of Engineering Science and Technology,Electronics and Telecommunication,Howrah,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10192366"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41947-8_4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.soildyn.2022.107574"},{"key":"ref4","article-title":"Hardware trojans - prevention, detection, countermeasures (a literature review)","volume-title":"Defense Technical Information Center","author":"Beaumont","year":"2011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/hldvt.2009.5340158"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/les.2022.3159541"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/iscas.2019.8702493"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/hst.2009.5224971"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581574"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050827"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2018.00024"}],"event":{"name":"2024 28th International Symposium on VLSI Design and Test (VDAT)","location":"Vellore, India","start":{"date-parts":[[2024,9,1]]},"end":{"date-parts":[[2024,9,3]]}},"container-title":["2024 28th International Symposium on VLSI Design and Test (VDAT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10705646\/10705432\/10705727.pdf?arnumber=10705727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T17:21:34Z","timestamp":1728580894000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10705727\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,1]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/vdat63601.2024.10705727","relation":{},"subject":[],"published":{"date-parts":[[2024,9,1]]}}}