{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T20:59:17Z","timestamp":1774645157958,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"ML-DSIV Project funded by CAPES and FCT Research and Development Agencies; in part by the German Research Foundation (DFG) \u201cACCROSS: Approximate Computing aCROss the System Stack;\u201d"},{"name":"Center for Cyber Security (CCS), New York University Abu Dhabi"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. I"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1109\/tcsi.2024.3457541","type":"journal-article","created":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T13:33:56Z","timestamp":1727789636000},"page":"180-191","source":"Crossref","is-referenced-by-count":3,"title":["On the Efficacy and Vulnerabilities of Logic Locking in Tree-Based Machine Learning"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0467-0461","authenticated-orcid":false,"given":"Brunno","family":"Alves de Abreu","sequence":"first","affiliation":[{"name":"Graduate Program in Microelectronics (PGMICRO), Institute of Informatics (INF), Universidade Federal do Rio Grande do Sul (UFRGS), Porto Alegre, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7809-9563","authenticated-orcid":false,"given":"Guilherme","family":"Paim","sequence":"additional","affiliation":[{"name":"Graduate Program in Microelectronics (PGMICRO), Institute of Informatics (INF), Universidade Federal do Rio Grande do Sul (UFRGS), Porto Alegre, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9932-6833","authenticated-orcid":false,"given":"Lilas","family":"Alrahis","sequence":"additional","affiliation":[{"name":"Division of Engineering, New York University Abu Dhabi (NYUAD), Abu Dhabi, United Arab Emirates"}]},{"given":"Paulo","family":"Flores","sequence":"additional","affiliation":[{"name":"High-Performance Computing Architectures and Systems (HPCAS), Instituto de Engenharia de Sistemas e Computadores-Investiga&#x00E7;&#x00E3;o e Desenvolvimento (INESC-ID), Instituto Superior T&#x00E9;cnico, University of Lisbon, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0782-0397","authenticated-orcid":false,"given":"Ozgur","family":"Sinanoglu","sequence":"additional","affiliation":[{"name":"Division of Engineering, New York University Abu Dhabi (NYUAD), Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9018-6309","authenticated-orcid":false,"given":"Sergio","family":"Bampi","sequence":"additional","affiliation":[{"name":"Graduate Program in Microelectronics (PGMICRO), Institute of Informatics (INF), Universidade Federal do Rio Grande do Sul (UFRGS), Porto Alegre, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5649-3102","authenticated-orcid":false,"given":"Hussam","family":"Amrouch","sequence":"additional","affiliation":[{"name":"Chair of AI Processor Design, Technical University of Munich (TUM), Munich, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2022.09.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119456735.ch1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2891911"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED54688.2022.9806213"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41378-021-00248-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3199903"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-25873-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.112130030"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3361682"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3100275"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484823"},{"key":"ref12","article-title":"Benchmarking at the frontier of hardware security: Lessons from logic locking","author":"Tan","year":"2020","journal-title":"arXiv:2006.06806"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774623"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3169028"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST56390.2022.10022175"},{"key":"ref16","volume-title":"UCI Machine Learning Repository","author":"Dua","year":"2017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34459-6_6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2459236.2459256"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2013.6548154"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2717764.2717783"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref22","volume-title":"TreeIP: Framework for Tree-based Hardware IP Generation","year":"2020"},{"issue":"1","key":"ref23","first-page":"3133","article-title":"Do we need hundreds of classifiers to solve real world classification problems?","volume":"15","author":"Fern\u00e1ndez-Delgado","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104638"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1244940"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3113035"},{"key":"ref28","volume-title":"NEOS: Netlist Encryption and Obfuscation Suite","author":"Shamsi","year":"2019"},{"key":"ref29","volume-title":"OMLA: An Oracle-Less Machine Learning-Based Attack on Logic Locking","author":"Alrahis","year":"2021"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218651"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3505634"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3453688.3461752"}],"container-title":["IEEE Transactions on Circuits and Systems I: Regular Papers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8919\/10836116\/10701566.pdf?arnumber=10701566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T19:54:07Z","timestamp":1774641247000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10701566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":32,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcsi.2024.3457541","relation":{},"ISSN":["1549-8328","1558-0806"],"issn-type":[{"value":"1549-8328","type":"print"},{"value":"1558-0806","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]}}}