{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T20:47:38Z","timestamp":1774039658941,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.23919\/date48585.2020.9116544","type":"proceedings-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T23:28:37Z","timestamp":1592263717000},"page":"358-363","source":"Crossref","is-referenced-by-count":13,"title":["Estimating the Circuit De-obfuscation Runtime based on Graph Deep Learning"],"prefix":"10.23919","author":[{"given":"Zhiqian","family":"Chen","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Kolhe","sequence":"additional","affiliation":[]},{"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[]},{"given":"Chang-Tien","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Sai","family":"Manoj P.D.","sequence":"additional","affiliation":[]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2005.00503.x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203759"},{"key":"ref31","article-title":"SMT-attack: Next generation attack on obfuscated circuits with capabilities and performance beyond the SAT attacks","author":"zamiri azar","year":"2019","journal-title":"Transaction of Cryptogra-phy Hardware and Embedded Systems"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942100"},{"key":"ref11","first-page":"265","article-title":"On optimization methods for deep learning","author":"le","year":"2011","journal-title":"ICML"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IGSC48788.2019.8957186"},{"key":"ref13","article-title":"Deeper insights into graph convolutional networks for semi-supervised learning","author":"li","year":"2018","journal-title":"Thirty-Second AAAI Conference on Artificial Intelligence"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3850\/9783981537079_0915"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/78.258082"},{"key":"ref16","year":"0","journal-title":"I T P R T most counterfeited parts represent a $169 billion potential challenge for global semiconductor industry"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015435"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3194554.3194596"},{"key":"ref19","article-title":"Learning a SAT solver from single-bit supervision","author":"selsam","year":"2018","journal-title":"ArXiv abs\/1802 03685"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062226"},{"key":"ref4","first-page":"3844","article-title":"Convolutional neural networks on graphs with fast localized spectral filtering","author":"defferrard","year":"2016","journal-title":"NIPS"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2944584"},{"key":"ref3","article-title":"Theilsen estimators in a multiple linear regression model","author":"dang","year":"2008","journal-title":"Olemiss Edu"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2010.04.005"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2511144"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1214\/009053604000000067","article-title":"Least angle regression","volume":"32","author":"efron","year":"2004","journal-title":"The Annals of Statistics"},{"key":"ref8","article-title":"Semi-supervised classification with graph convolutional networks","author":"kipf","year":"2017","journal-title":"ICLRE"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2018.00066"},{"key":"ref2","author":"chung","year":"1997","journal-title":"Spectral Graph Theory"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3299874.3319496"},{"key":"ref1","author":"bishop","year":"2014","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2235192"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/B:STCO.0000035301.49549.88"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2015.02.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref26","article-title":"Graph attention networks","author":"veli?kovi?","year":"2018","journal-title":"ICLRE"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"}],"event":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","location":"Grenoble, France","start":{"date-parts":[[2020,3,9]]},"end":{"date-parts":[[2020,3,13]]}},"container-title":["2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9112295\/9116186\/09116544.pdf?arnumber=9116544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T22:09:06Z","timestamp":1595887746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9116544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":33,"URL":"https:\/\/doi.org\/10.23919\/date48585.2020.9116544","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}