{"id":"https://openalex.org/W3011920899","doi":"https://doi.org/10.1109/ccwc47524.2020.9031281","title":"Hardware Trojan Detection Method Based on Time Feature of Chip Temperature","display_name":"Hardware Trojan Detection Method Based on Time Feature of Chip Temperature","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3011920899","doi":"https://doi.org/10.1109/ccwc47524.2020.9031281","mag":"3011920899"},"language":"en","primary_location":{"id":"doi:10.1109/ccwc47524.2020.9031281","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc47524.2020.9031281","pdf_url":null,"source":{"id":"https://openalex.org/S4306498584","display_name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101073321","display_name":"Lian Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lian Yang","raw_affiliation_strings":["School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100335132","display_name":"Xiong Li","orcid":"https://orcid.org/0000-0001-6619-554X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiong Li","raw_affiliation_strings":["School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100622355","display_name":"Huan Li","orcid":"https://orcid.org/0000-0001-6408-2795"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huan Li","raw_affiliation_strings":["School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101073321"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.8076,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.63507109,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1029","last_page":"1032"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12859","display_name":"Cell Image Analysis Techniques","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/1304","display_name":"Biophysics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.89266037940979},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.8480045795440674},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.7235821485519409},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5774932503700256},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5605514645576477},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5493582487106323},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.48644089698791504},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.47258079051971436},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4338809847831726},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.4256390333175659},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.402663916349411},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15026646852493286},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.14415869116783142},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14410120248794556},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12560418248176575},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.10373210906982422},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09877359867095947},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07575997710227966}],"concepts":[{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.89266037940979},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.8480045795440674},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.7235821485519409},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5774932503700256},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5605514645576477},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5493582487106323},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.48644089698791504},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.47258079051971436},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4338809847831726},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.4256390333175659},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.402663916349411},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15026646852493286},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.14415869116783142},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14410120248794556},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12560418248176575},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.10373210906982422},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09877359867095947},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07575997710227966},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccwc47524.2020.9031281","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc47524.2020.9031281","pdf_url":null,"source":{"id":"https://openalex.org/S4306498584","display_name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 10th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1605172130","https://openalex.org/W1990097965","https://openalex.org/W2021653168","https://openalex.org/W2038861118","https://openalex.org/W2042813319","https://openalex.org/W2065858973","https://openalex.org/W2094691152","https://openalex.org/W2101528158","https://openalex.org/W2108726631","https://openalex.org/W2129960401","https://openalex.org/W2144658863","https://openalex.org/W2145937629","https://openalex.org/W2154958010","https://openalex.org/W2161998562","https://openalex.org/W2188816167","https://openalex.org/W2795586628","https://openalex.org/W4231825163","https://openalex.org/W4285719527","https://openalex.org/W6676426964","https://openalex.org/W6686966007"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W4318003314","https://openalex.org/W2120912790","https://openalex.org/W2782017703","https://openalex.org/W4248805755","https://openalex.org/W2677867825"],"abstract_inverted_index":{"Hardware":[0],"security":[1,5],"has":[2,24,28,188],"become":[3],"a":[4,210],"issue":[6],"that":[7,69],"cannot":[8],"be":[9,201],"ignored":[10],"in":[11,100,203],"the":[12,53,57,66,70,75,81,87,96,101,106,110,114,119,123,148,152,157,172,176,180,204],"world.":[13],"Academia's":[14],"research":[15],"on":[16,42],"hardware":[17,38,62],"Trojan":[18,39,63,207],"detection":[19,40,88,115,158,173,190,208],"at":[20],"IC":[21],"(Integrated":[22],"Circuit)":[23],"been":[25],"ongoing":[26],"and":[27,45,90,129,136,166,170,186,195],"achieved":[29],"many":[30],"achievements.":[31],"At":[32],"present,":[33],"some":[34],"scholars":[35],"are":[36],"exploring":[37],"based":[41],"chip":[43,58,82],"power":[44],"temperature.":[46],"In":[47],"this":[48],"paper,":[49],"we":[50],"also":[51],"use":[52,95,131],"temperature":[54,79,102],"information":[55],"of":[56,77,105,126,138,206,213],"to":[59,94,121,133],"carry":[60],"out":[61],"detection,":[64],"but":[65],"difference":[67,76,99,146],"is":[68,93,183],"existing":[71],"methods":[72],"directly":[73],"used":[74,202],"steady-state":[78],"after":[80],"reaches":[83],"steady":[84,111],"state":[85,112],"as":[86,113],"basis,":[89,116],"our":[91],"method":[92,182,199],"arrival":[97],"time":[98],"rising":[103],"phase":[104],"chips":[107,150,214],"before":[108],"reaching":[109],"then":[117],"extract":[118],"feature":[120],"obtain":[122],"characteristic":[124],"value":[125],"each":[127],"chip,":[128],"finally":[130],"them":[132],"perform":[134],"classification":[135],"identification":[137],"infected":[139,149],"chips.":[140],"Our":[141],"basis":[142],"could":[143],"show":[144],"larger":[145],"for":[147,163,209],"under":[151],"same":[153],"conditions,":[154],"which":[155],"makes":[156],"data":[159],"have":[160],"better":[161],"accommodation":[162],"measurement":[164,193],"noise":[165,194],"process":[167],"variation":[168],"(PV)":[169],"improves":[171],"accuracy.":[174],"Through":[175],"relevant":[177],"experimental":[178],"verification,":[179],"proposed":[181,198],"completely":[184],"feasible,":[185],"still":[187],"high":[189],"accuracy":[191],"with":[192],"PV.":[196],"The":[197],"can":[200],"case":[205],"certain":[211],"number":[212],"without":[215],"golden":[216],"chip.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
