{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T04:40:01Z","timestamp":1756528801058,"version":"3.44.0"},"reference-count":32,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"16","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Electron. Express"],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1587\/elex.22.20250380","type":"journal-article","created":{"date-parts":[[2025,7,13]],"date-time":"2025-07-13T22:07:09Z","timestamp":1752444429000},"page":"20250380-20250380","source":"Crossref","is-referenced-by-count":0,"title":["Efficient hardware Trojans detection through multi-scale features fusion of thermal radiation maps"],"prefix":"10.1587","volume":"22","author":[{"given":"Ting","family":"Su","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology"}]},{"given":"Chunmei","family":"Hu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology"}]},{"given":"Simin","family":"Feng","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology"}]},{"given":"Yiming","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology"}]},{"given":"Lusi","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology"}]},{"given":"Xing","family":"Hu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology"}]},{"given":"Yaohua","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] S.T. King, <i>et al.<\/i>: \u201cDesigning and implementing malicious hardware,\u201d Leet <b>8<\/b> (2008) 1.","DOI":"10.1145\/1346281.2181012"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] S. Bhasin and F. Regazzoni: \u201cA survey on hardware trojan detection techniques,\u201d IEEE Int. Symp. Circuits Syst. (ISCAS) (2015) 2021 (DOI: 10.1109\/ISCAS.2015.7169073).","DOI":"10.1109\/ISCAS.2015.7169073"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] S. Mitra, <i>et al<\/i>.: \u201cThe Trojan-proof chip,\u201d IEEE Spectr. <b>52<\/b> (2015) 46 (DOI: 10.1109\/MSPEC.2015.7024511).","DOI":"10.1109\/MSPEC.2015.7024511"},{"key":"4","unstructured":"[4] K. Dharsee and J. Criswell: \u201cJinn: Hijacking safe programs with Trojans,\u201d USENIX Security Symp. <b>32<\/b> (2023) 6965."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] L. Lin, <i>et al.<\/i>: \u201cTrojan side-channels: lightweight hardware Trojans through side-channel engineering,\u201d Cryptographic Hardware and Embedded Systems (CHES 2009) (2009) 382 (DOI: 10.1007\/978-3-642-04138-9_27).","DOI":"10.1007\/978-3-642-04138-9_27"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] K. Yang, <i>et al.<\/i>: \u201cA2: analog malicious hardware,\u201d IEEE Symp. Security Privacy (SP) (2016) 18 (DOI: 10.1109\/SP.2016.10).","DOI":"10.1109\/SP.2016.10"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] T. Perez, <i>et al.<\/i>: \u201cSide-channel Trojan insertion\u2006\u2014\u2006a practical foundry-side attack via ECO,\u201d IEEE Int. Symp. Circuits Syst. (ISCAS) (2021) 1 (DOI: 10.1109\/ISCAS51556.2021.9401481).","DOI":"10.1109\/ISCAS51556.2021.9401481"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] T.D. Perez and S. Pagliarini: \u201cHardware Trojan insertion in finalized layouts: from methodology to a silicon demonstration,\u201d IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. <b>42<\/b> (2023) 2094 (DOI: 10.1109\/TCAD.2022.3223846).","DOI":"10.1109\/TCAD.2022.3223846"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] A.N. Nowroz, <i>et al.<\/i>: \u201cNovel techniques for high-sensitivity hardware Trojan detection using thermal and power maps,\u201d IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. <b>33<\/b> (2014) 1792 (DOI: 10.1109\/TCAD.2014.2354293).","DOI":"10.1109\/TCAD.2014.2354293"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] Y. Tang, <i>et al.<\/i>: \u201cThermal maps based HT detection using spatial projection transformation,\u201d IET Inf. Secur. <b>12<\/b> (2018) 356 (DOI: 10.1049\/iet-ifs.2017.0354).","DOI":"10.1049\/iet-ifs.2017.0354"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] Y. Tang, <i>et al<\/i>.: \u201cActivity factor based hardware Trojan detection and localization,\u201d J. Electron. Test. <b>35<\/b> (2019) 293 (DOI: 10.1007\/s10836-019-05803-1).","DOI":"10.1007\/s10836-019-05803-1"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] Y. Tang, <i>et al.<\/i>: \u201cGolden-chip-free hardware Trojan detection through quiescent thermal maps,\u201d IEEE Trans. Very Large Scale Integr. (VLSI) Syst. <b>27<\/b> (2019) 2872 (DOI: 10.1109\/TVLSI.2019.2933441).","DOI":"10.1109\/TVLSI.2019.2933441"},{"key":"13","unstructured":"[13] T. Su, <i>et al.<\/i>: \u201cImproving the ability of thermal radiation based hardware Trojan detection,\u201d USENIX Security Symp. <b>33<\/b> (2024) 127."},{"key":"14","unstructured":"[14] X. Wang, <i>et al<\/i>.: \u201cDetecting malicious inclusions in secure hardware: Challenges and solutions,\u201d IEEE Int. Workshop Hardw.-Oriented Secur. Trust (2008) 15 (DOI: 10.1109\/HST.2008.4559039)."},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] M. Tehranipoor and F. Koushanfar: \u201cA survey of hardware Trojan taxonomy and detection,\u201d IEEE Des. Test. Comput. <b>27<\/b> (2010) 10 (DOI: 10.1109\/MDT.2010.7).","DOI":"10.1109\/MDT.2010.7"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] T. Trippel, <i>et al.<\/i>: \u201cICAS: an extensible framework for estimating the susceptibility of IC layouts to additive Trojans,\u201d IEEE Symp. Security Privacy (SP) (2020) 1742 (DOI: 10.1109\/SP40000.2020.00083).","DOI":"10.1109\/SP40000.2020.00083"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] F. Courbon, <i>et al.<\/i>: \u201cA high efficiency hardware Trojan detection technique based on fast SEM imaging,\u201d Des. Autom. Test Eur. Conf. Exhib. (DATE) (2015) 788 (DOI: 10.7873\/DATE.2015.1104).","DOI":"10.7873\/DATE.2015.1104"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] M. Xue, <i>et al.<\/i>: \u201cTen years of hardware Trojans: a survey from the attacker\u2019s perspective,\u201d IET Comput. Digit. Tech. <b>14<\/b> (2020) 231 (DOI: 10.1049\/iet-cdt.2020.0041).","DOI":"10.1049\/iet-cdt.2020.0041"},{"key":"19","unstructured":"[19] Y.L. Gwon, <i>et al<\/i>.: \u201cDISTROY: Detecting integrated circuit trojans with compressive measurements,\u201d USENIX Security Symp. (2011)."},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] O. Ronneberger, <i>et al<\/i>.: \u201cU-Net: Convolutional networks for biomedical image segmentation,\u201d Lect. Notes Comput. Sci. (LNCS) <b>9351<\/b> (2015) 234 (DOI: 10.1007\/978-3-319-24574-4_28).","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] K. Hasegawa, <i>et al<\/i>.: \u201cEmpirical evaluation and optimization of hardware-Trojan classification for gate-level netlists based on multi-layer neural networks,\u201d IEICE Trans. Fundamentals <b>E101-A<\/b> (2018) 2320 (DOI: 10.1587\/transfun.E101.A.2320).","DOI":"10.1587\/transfun.E101.A.2320"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] Y. Ma, <i>et al.<\/i>: \u201cFeature compression with 3D sparse convolution,\u201d IEEE Int. Conf. Visual Commun. Image Process. (VCIP) (2024) 1 (DOI: 10.1109\/VCIP63160.2024.10849908).","DOI":"10.1109\/VCIP63160.2024.10849908"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] E. Puschner, <i>et al.<\/i>: \u201cRed team vs. blue team: a real-world hardware Trojan detection case study across four modern CMOS technology generations,\u201d IEEE Symp. Security Privacy (SP) (2023) 56 (DOI: 10.1109\/SP46215.2023.10179341).","DOI":"10.1109\/SP46215.2023.10179341"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] M.A.B. Siddik and S.H. Alam, \u201cPUF-based hardware Trojan: design and novel attack on encryption circuit,\u201d Int. Conf. Electr., Comput. Commun. Eng. (ECCE) (2023) 1 (DOI: 10.1109\/ECCE57851.2023.10101599).","DOI":"10.1109\/ECCE57851.2023.10101599"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] D. Deng, <i>et al<\/i>.: \u201cNovel design strategy toward A2 Trojan detection based on built-in acceleration structure,\u201d IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. <b>39<\/b> (2020) 4496 (DOI: 10.1109\/TCAD.2020.2977069).","DOI":"10.1109\/TCAD.2020.2977069"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] A. Jain, <i>et al<\/i>.: \u201cTAAL: tampering attack on any key-based logic locked circuits,\u201d ACM Trans. Des. Autom. Electron. Syst. <b>26<\/b> (2021) 1 (DOI: 10.1145\/3442379).","DOI":"10.1145\/3442379"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] A. Kumar, <i>et al.<\/i>: \u201c<i>edAttack<\/i>: hardware Trojan attack on on-chip packet compression,\u201d IEEE Des. Test <b>40<\/b> (2023) 125 (DOI: 10.1109\/MDAT.2023.3306718).","DOI":"10.1109\/MDAT.2023.3306718"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] Z. Chen, <i>et al.<\/i>: \u201cToward FPGA security in IoT: a new detection technique for hardware Trojans,\u201d IEEE Internet Things J. <b>6<\/b> (2019) 7061 (DOI: 10.1109\/JIOT.2019.2914079).","DOI":"10.1109\/JIOT.2019.2914079"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] J. He, <i>et al.<\/i>: \u201cGolden chip free Trojan detection leveraging electromagnetic side channel fingerprinting,\u201d IEICE Electron. Express <b>16<\/b> (2019) 20181065 (DOI: 10.1587\/elex.16.20181065).","DOI":"10.1587\/elex.16.20181065"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] X. Ngo, <i>et al.<\/i>: \u201cHardware Trojan detection by delay and electromagnetic measurements,\u201d Design, Autom. Test Eur. Conf. Exhib. (DATE) (2015) 782 (DOI: 10.7873\/DATE.2015.1103).","DOI":"10.7873\/DATE.2015.1103"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] A. Nasr, <i>et al.<\/i>: \u201cA Siamese deep learning framework for efficient hardware Trojan detection using power side-channel data,\u201d Sci. Rep. <b>14<\/b> (2024) 13013 (DOI: 10.1038\/s41598-024-62744-2).","DOI":"10.1038\/s41598-024-62744-2"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] T. Hu, <i>et al.<\/i>: \u201cHardware Trojan detection combine with machine learning: an SVM-based detection approach,\u201d IEEE Int. Conf. Anti-counterfeiting, Secur. Identif. (ASID) (2019) 202 (DOI: 10.1109\/ICASID.2019.8924992).","DOI":"10.1109\/ICASID.2019.8924992"}],"container-title":["IEICE Electronics Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/22\/16\/22_22.20250380\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T04:00:51Z","timestamp":1756526451000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/22\/16\/22_22.20250380\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,25]]},"references-count":32,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.1587\/elex.22.20250380","relation":{},"ISSN":["1349-2543"],"issn-type":[{"type":"electronic","value":"1349-2543"}],"subject":[],"published":{"date-parts":[[2025,8,25]]},"article-number":"22.20250380"}}