{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:07Z","timestamp":1750220587385,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T00:00:00Z","timestamp":1604275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["1651701"],"award-info":[{"award-number":["1651701"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,2]]},"DOI":"10.1145\/3400302.3415648","type":"proceedings-article","created":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T01:20:55Z","timestamp":1608254455000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Adaptable and divergent synthetic benchmark generation for hardware security"],"prefix":"10.1145","author":[{"given":"Sarah","family":"Amir","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"320","published-online":{"date-parts":[[2020,12,17]]},"reference":[{"volume-title":"IWLS 2005 benchmarks. In International Workshop for Logic Synthesis (IWLS). 9.","year":"2005","author":"Albrecht Christoph","key":"e_1_3_2_1_1_1"},{"volume-title":"Proceedings of the 24th International Workshop on Logic & Synthesis (IWLS).","year":"2015","author":"Amar\u00fa Luca","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0036-3"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2019.10.002"},{"volume-title":"ABC: A System for Sequential Synthesis and Verification","year":"2004","author":"Berkeley Logic Synthesis and Verification Group","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.1989.100747"},{"volume-title":"Proceedings of IEEE Int'l Symposium Circuits and Systems (ISCAS 85)","author":"Brglez F.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/54.867894"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-018-5726-9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCS.1979.1084687"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/240518.240537"},{"key":"e_1_3_2_1_13_1","unstructured":"Michael Hutton Jonathan Rose and Derek Corneil. 2003. Clustered And Iterative Synthetic Circuit Generation. http:\/\/www.eecg.toronto.edu\/~jayar\/software\/Cgen\/Cgen.html  Michael Hutton Jonathan Rose and Derek Corneil. 2003. Clustered And Iterative Synthetic Circuit Generation. http:\/\/www.eecg.toronto.edu\/~jayar\/software\/Cgen\/Cgen.html"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/43.728919"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/267665.267704"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/127601.127678"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.344672"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1971.223159"},{"volume-title":"Proceedings of 30th Annual International Symposium on Microarchitecture. IEEE, 330--335","year":"1997","author":"Lee Chunho","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"David G Luenberger Yinyu Ye etal 1984. Linear and nonlinear programming. Vol. 2. Springer.  David G Luenberger Yinyu Ye et al. 1984. Linear and nonlinear programming. Vol. 2. Springer."},{"volume-title":"TetraMAX ATPG user guide. Version X-2005.09","year":"2005","author":"Manual Synopsys User","key":"e_1_3_2_1_21_1"},{"volume-title":"The effectiveness of data augmentation in image classification using deep learning. arXiv preprint arXiv:1712.04621","year":"2017","author":"Perez Luis","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0001-6"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0197-0"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/43.863641"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"e_1_3_2_1_28_1","unstructured":"Pramod Subramanyan Sayak Ray and Sharad Malik. 2015. SAT Attack tool. https:\/\/bitbucket.org\/spramod\/host15-logic-encryption  Pramod Subramanyan Sayak Ray and Sharad Malik. 2015. SAT Attack tool. https:\/\/bitbucket.org\/spramod\/host15-logic-encryption"},{"volume-title":"Swarup Bhunia, Danielle Duvalsaint, Amin Rezaei, Yuanqi Shen, et al.","year":"2020","author":"Tan Benjamin","key":"e_1_3_2_1_29_1"},{"volume":"5","volume-title":"2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512)","author":"Wan Tao","key":"e_1_3_2_1_30_1"},{"volume-title":"Proc. 4th Intl. Conf. for Young Computer Scientists. 136--141","year":"1995","author":"Marck Herwig Van","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings (IEEE Cat No. 00CH36353)","volume":"4","author":"Verplaetse Peter","year":"2000"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228378"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2511144"}],"event":{"name":"ICCAD '20: IEEE\/ACM International Conference on Computer-Aided Design","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA","IEEE CS"],"location":"Virtual Event USA","acronym":"ICCAD '20"},"container-title":["Proceedings of the 39th International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400302.3415648","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3400302.3415648","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3400302.3415648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:41Z","timestamp":1750195901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400302.3415648"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":34,"alternative-id":["10.1145\/3400302.3415648","10.1145\/3400302"],"URL":"https:\/\/doi.org\/10.1145\/3400302.3415648","relation":{},"subject":[],"published":{"date-parts":[[2020,11,2]]},"assertion":[{"value":"2020-12-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}