{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T22:14:04Z","timestamp":1769552044631,"version":"3.49.0"},"reference-count":35,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2025,12,1]]},"DOI":"10.1587\/transfun.2024eap1145","type":"journal-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T18:07:47Z","timestamp":1749146867000},"page":"1598-1611","source":"Crossref","is-referenced-by-count":1,"title":["Gen-Power2: Improved Anomaly Detection in IoT Devices Utilizing Generated Power Waveforms"],"prefix":"10.1587","volume":"E108.A","author":[{"given":"Ryusei","family":"EDA","sequence":"first","affiliation":[{"name":"Department of Computer Science and Communications Engineering, Waseda University"}]},{"given":"Kota","family":"HISAFURU","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Communications Engineering, Waseda University"}]},{"given":"Nozomu","family":"TOGAWA","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Communications Engineering, Waseda University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] S. Bhunia, M.S. Hsiao, M. Banga, and S. Narasimhan, \u201cHardware trojan attacks: Threat analysis and countermeasures,\u201d Proc. IEEE, vol.102, no.8, pp.1229-1247, 2014. 10.1109\/jproc.2014.2334493","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] Q.D. Ngo, H.T. Nguyen, V.H. Le, and D.H. Nguyen, \u201cA survey of IoT malware and detection methods based on static features,\u201d ICT Express, vol.6, no.4, pp.280-286, 2020. 10.1016\/j.icte.2020.04.005","DOI":"10.1016\/j.icte.2020.04.005"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] J. Francq and F. Frick, \u201cIntroduction to hardware Trojan detection methods,\u201d Proc. 2015 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE), pp.770-775, 2015. 10.7873\/date.2015.1101","DOI":"10.7873\/DATE.2015.1101"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] Y. Jin and Y. Makris, \u201cHardware Trojan detection using path delay fingerprint,\u201d Proc. 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.51-57, 2008. 10.1109\/hst.2008.4559049","DOI":"10.1109\/HST.2008.4559049"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] M. Oya, Y. Shi, M. Yanagisawa, and N. Togawa, \u201cA score-based classification method for identifying hardware-trojans at gate-level netlists,\u201d 2015 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE), pp.465-470, IEEE, 2015. 10.7873\/date.2015.0352","DOI":"10.7873\/DATE.2015.0352"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] H. HaddadPajouh, A. Dehghantanha, R. Khayami, and K.K.R. Choo, \u201cA deep recurrent neural network based approach for internet of things malware threat hunting,\u201d Future Generation Computer Systems, vol.85, pp.88-96, 2018. 10.1016\/j.future.2018.03.007","DOI":"10.1016\/j.future.2018.03.007"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] R. Islam, R. Tian, L.M. Batten, and S. Versteeg, \u201cClassification of malware based on integrated static and dynamic features,\u201d Journal of Network and Computer Applications, vol.36, no.2, pp.646-656, 2013. 10.1016\/j.jnca.2012.10.004","DOI":"10.1016\/j.jnca.2012.10.004"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] L. Wang, H. Xie, and H. Luo, \u201cMalicious circuitry detection using transient power analysis for ic security,\u201d Proc. 2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE), pp.1164-1167, 2013. 10.1109\/qr2mse.2013.6625774","DOI":"10.1109\/QR2MSE.2013.6625774"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] S. Bhasin, J.L. Danger, S. Guilley, X.T. Ngo, and L. Sauvage, \u201cHardware Trojan horses in cryptographic IP cores,\u201d Proc. 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.15-29, 2013. 10.1109\/fdtc.2013.15","DOI":"10.1109\/FDTC.2013.15"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, \u201cTrojan detection using IC fingerprinting,\u201d Proc. 2007 IEEE Symposium on Security and Privacy (SP\u201907), pp.296-310, 2007. 10.1109\/sp.2007.36","DOI":"10.1109\/SP.2007.36"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] A.M. Zaza, S.K. Kharroub, and K. Abualsaud, \u201cLightweight IoT malware detection solution using CNN classification,\u201d 2020 IEEE 3rd 5G World Forum (5GWF), pp.212-217, IEEE, 2020. 10.1109\/5gwf49715.2020.9221100","DOI":"10.1109\/5GWF49715.2020.9221100"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] T. Zhang, M. Tehranipoor, and F. Farahmandi, \u201cTrustguard: Standalone FPGA-based security monitoring through power side-channel,\u201d IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol.32, no.2, pp.319-332, 2024. 10.1109\/tvlsi.2023.3335876","DOI":"10.1109\/TVLSI.2023.3335876"},{"key":"13","unstructured":"[13] K. Bobrovnikova, S. Lysenko, P.T. Popov, D. Denysiuk, and A. Goroshko, \u201cTechnique for IoT cyberattacks detection based on the energy consumption analysis,\u201d CEUR Workshop Proceedings, 2021."},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] A. Nasr, K. Mohamed, A. Elshenawy, and M. Zaki, \u201cA siamese deep learning framework for efficient hardware trojan detection using power side-channel data,\u201d Sci. Rep., vol.14, no.1, p.13013, 2024. 10.1038\/s41598-024-62744-2","DOI":"10.1038\/s41598-024-62744-2"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] A. Albasir, K. Naik, and R. Manzano, \u201cToward improving the security of IoT and CPS devices: An AI approach,\u201d Digital Threats: Research and Practice, vol.4, no.2, pp.1-30, 2023. 10.1145\/3497862","DOI":"10.1145\/3497862"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] K. Hisafuru, K. Takasaki, and N. Togawa, \u201cAn anomalous behavior detection method utilizing IoT power waveform shapes,\u201d IEICE Trans. Fundamentals, vol.E107-A, no.1, pp.75-86, Jan. 2024. 10.1587\/transfun.2023kep0012","DOI":"10.1587\/transfun.2023KEP0012"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] K. Hisafuru and N. Togawa, \u201cGen-power: Anomaly detection in IoT devices utilizing generated power waveforms,\u201d Proc. 2024 42nd IEEE International Conference on Consumer Electronics (ICCE), 2024. 10.1109\/icce59016.2024.10444192","DOI":"10.1109\/ICCE59016.2024.10444192"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] R. Eda, K. Hisafuru, and N. Togawa, \u201cAnomalous IoT behavior detection by generated power waveforms with hyper-parameter tuning,\u201d 2024 IEEE 30th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp.1-3, IEEE, 2024. 10.1109\/iolts60994.2024.10616055","DOI":"10.1109\/IOLTS60994.2024.10616055"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] B.K. Aichernig, E. Mu\u0161kardin, and A. Pferscher, \u201cLearning-based fuzzing of iot message brokers,\u201d 2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST), pp.47-58, IEEE, 2021. 10.1109\/icst49551.2021.00017","DOI":"10.1109\/ICST49551.2021.00017"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] S. Bekrar, C. Bekrar, R. Groz, and L. Mounier, \u201cFinding software vulnerabilities by smart fuzzing,\u201d 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation, pp.427-430, IEEE, 2011. 10.1109\/icst.2011.48","DOI":"10.1109\/ICST.2011.48"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] R.S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia, \u201cMERO: A statistical approach for hardware Trojan detection,\u201d International Workshop on Cryptographic Hardware and Embedded Systems, pp.396-410, Springer, 2009. 10.1007\/978-3-642-04138-9_28","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] H. Xing, H. Qin, S. Luo, P. Dai, L. Xu, and X. Cheng, \u201cSpectrum sensing in cognitive radio: A deep learning based model,\u201d Trans. Emerging Tel. Tech., vol.33, no.1, e4388, 2022. 10.1002\/ett.4388","DOI":"10.1002\/ett.4388"},{"key":"23","unstructured":"[23] Z. Zeng, R. Kaur, S. Siddagangappa, S. Rahimi, T. Balch, and M. Veloso, \u201cFinancial time series forecasting using CNN and transformer,\u201d arXiv preprint, arXiv:2304.04912, 2023. 10.48550\/arXiv.2304.04912"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] A. Wan, Q. Chang, A.B. Khalil, and J. He, \u201cShort-term power load forecasting for combined heat and power using CNN-LSTM enhanced by attention mechanism,\u201d Energy, vol.282, p.128274, 2023. 10.1016\/j.energy.2023.128274","DOI":"10.1016\/j.energy.2023.128274"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] Y. Nam, S. Yoon, Y. Shin, M. Bae, H. Song, J.G. Lee, and B.S. Lee, \u201cBreaking the time-frequency granularity discrepancy in time-series anomaly detection,\u201d Proc. ACM on Web Conference 2024, 2024. 10.1145\/3589334.3645556","DOI":"10.1145\/3589334.3645556"},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] K. Nimmy, M. Dilraj, S. Sankaran, and K. Achuthan, \u201cLeveraging power consumption for anomaly detection on IoT devices in smart homes,\u201d J. Ambient. Intell. Human. Comput., vol.14, no.10, pp.14045-14056, 2023. 10.1007\/s12652-022-04110-6","DOI":"10.1007\/s12652-022-04110-6"},{"key":"27","unstructured":"[28] J. Bergstra, R. Bardenet, Y. Bengio, and B. K\u00e9gl, \u201cAlgorithms for hyper-parameter optimization,\u201d Advances in Neural Information Processing Systems, vol.24, 2011."},{"key":"28","doi-asserted-by":"crossref","unstructured":"[29] A. Ermshaus, P. Sch\u00e4fer, and U. Leser, \u201cWindow size selection in unsupervised time series analytics: A review and benchmark,\u201d Proc. International Workshop on Advanced Analytics and Learning on Temporal Data, pp.83-101, Springer, 2023. 10.1007\/978-3-031-24378-3_6","DOI":"10.1007\/978-3-031-24378-3_6"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[30] M.M. Breunig, H.P. Kriegel, R.T. Ng, and J. Sander, \u201cLOF: Identifying density-based local outliers,\u201d Proc. 2000 ACM SIGMOD International Conference on Management of Data, pp.93-104, 2000. 10.1145\/342009.335388","DOI":"10.1145\/342009.335388"},{"key":"30","unstructured":"[31] \u201cUltra96.\u201d https:\/\/www.avnet.com\/wps\/portal\/japan\/products\/product-highlights\/ultra96\/"},{"key":"31","unstructured":"[32] \u201cRaspberry Pi.\u201d https:\/\/www.raspberrypi.org\/"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[33] A. Kulkarni, Y. Pino, and T. Mohsenin, \u201cSVM-based real-time hardware Trojan detection for many-core platform,\u201d 2016 17th International Symposium on Quality Electronic Design (ISQED), pp.362-367, IEEE, 2016. 10.1109\/isqed.2016.7479228","DOI":"10.1109\/ISQED.2016.7479228"},{"key":"33","doi-asserted-by":"publisher","unstructured":"[34] H. Nizam, S. Zafar, Z. Lv, F. Wang, and X. Hu, \u201cReal-time deep anomaly detection framework for multivariate time-series data in industrial IoT,\u201d IEEE Sensors J., vol.22, no.23, pp.22836-22849, 2022. 10.1109\/jsen.2022.3211874","DOI":"10.1109\/JSEN.2022.3211874"},{"key":"34","doi-asserted-by":"publisher","unstructured":"[35] K. Bandara, R.J. Hyndman, and C. Bergmeir, \u201cMSTL: A seasonal-trend decomposition algorithm for time series with multiple seasonal patterns,\u201d International Journal of Operational Research, vol.52, no.1, pp.79-98, 2025. 10.1504\/ijor.2025.143957","DOI":"10.1504\/IJOR.2025.143957"},{"key":"35","unstructured":"[36] \u201cLocalOutlierFactor.\u201d https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.neighbors.LocalOutlierFactor.html"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/12\/E108.A_2024EAP1145\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T03:24:47Z","timestamp":1764991487000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/12\/E108.A_2024EAP1145\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,1]]},"references-count":35,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2024eap1145","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,1]]},"article-number":"2024EAP1145"}}