{"id":"https://openalex.org/W4389166687","doi":"https://doi.org/10.1109/iccad57390.2023.10323915","title":"Automated Hardware Trojan Detection at LUT Using Explainable Graph Neural Networks","display_name":"Automated Hardware Trojan Detection at LUT Using Explainable Graph Neural Networks","publication_year":2023,"publication_date":"2023-10-28","ids":{"openalex":"https://openalex.org/W4389166687","doi":"https://doi.org/10.1109/iccad57390.2023.10323915"},"language":"en","primary_location":{"id":"doi:10.1109/iccad57390.2023.10323915","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad57390.2023.10323915","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040636479","display_name":"Lingjuan Wu","orcid":"https://orcid.org/0000-0002-7624-2706"},"institutions":[{"id":"https://openalex.org/I204823248","display_name":"Huazhong Agricultural University","ror":"https://ror.org/023b72294","country_code":"CN","type":"education","lineage":["https://openalex.org/I204823248"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lingjuan Wu","raw_affiliation_strings":["College of Informatics, Huazhong Agricultural University,Wuhan,China,430070"],"affiliations":[{"raw_affiliation_string":"College of Informatics, Huazhong Agricultural University,Wuhan,China,430070","institution_ids":["https://openalex.org/I204823248"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010637524","display_name":"Hao Su","orcid":"https://orcid.org/0000-0003-3299-7418"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Su","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University,Xi&#x0027;an,China,710072"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University,Xi&#x0027;an,China,710072","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100764999","display_name":"Xuelin Zhang","orcid":"https://orcid.org/0000-0003-1415-9402"},"institutions":[{"id":"https://openalex.org/I204823248","display_name":"Huazhong Agricultural University","ror":"https://ror.org/023b72294","country_code":"CN","type":"education","lineage":["https://openalex.org/I204823248"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuelin Zhang","raw_affiliation_strings":["College of Informatics, Huazhong Agricultural University,Wuhan,China,430070"],"affiliations":[{"raw_affiliation_string":"College of Informatics, Huazhong Agricultural University,Wuhan,China,430070","institution_ids":["https://openalex.org/I204823248"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103159031","display_name":"Yu Tai","orcid":"https://orcid.org/0000-0002-2584-2867"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Tai","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University,Xi&#x0027;an,China,710072"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University,Xi&#x0027;an,China,710072","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100452614","display_name":"Han Li","orcid":"https://orcid.org/0000-0003-0276-9756"},"institutions":[{"id":"https://openalex.org/I204823248","display_name":"Huazhong Agricultural University","ror":"https://ror.org/023b72294","country_code":"CN","type":"education","lineage":["https://openalex.org/I204823248"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Han Li","raw_affiliation_strings":["College of Informatics, Huazhong Agricultural University,Wuhan,China,430070"],"affiliations":[{"raw_affiliation_string":"College of Informatics, Huazhong Agricultural University,Wuhan,China,430070","institution_ids":["https://openalex.org/I204823248"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081392219","display_name":"Wei Hu","orcid":"https://orcid.org/0000-0001-6738-4297"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Hu","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University,Xi&#x0027;an,China,710072"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University,Xi&#x0027;an,China,710072","institution_ids":["https://openalex.org/I17145004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5040636479"],"corresponding_institution_ids":["https://openalex.org/I204823248"],"apc_list":null,"apc_paid":null,"fwci":1.8481,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.85411432,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.8343453407287598},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.8069114685058594},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.7838280200958252},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7455927133560181},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6395982503890991},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.48555871844291687},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4788936674594879},{"id":"https://openalex.org/keywords/lookup-table","display_name":"Lookup table","score":0.4474645256996155},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4221996068954468},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3936706781387329},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.37495720386505127},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33468544483184814},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3276183009147644},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16484445333480835},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12590304017066956}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.8343453407287598},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.8069114685058594},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.7838280200958252},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7455927133560181},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6395982503890991},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.48555871844291687},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4788936674594879},{"id":"https://openalex.org/C134835016","wikidata":"https://www.wikidata.org/wiki/Q690265","display_name":"Lookup table","level":2,"score":0.4474645256996155},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4221996068954468},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3936706781387329},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.37495720386505127},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33468544483184814},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3276183009147644},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16484445333480835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12590304017066956}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccad57390.2023.10323915","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad57390.2023.10323915","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2858416415","display_name":null,"funder_award_id":"2021YFB3100900","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G473269127","display_name":null,"funder_award_id":"62074131","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5379886080","display_name":null,"funder_award_id":"2662022XXYJ005","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W76123274","https://openalex.org/W1591013007","https://openalex.org/W2001441503","https://openalex.org/W2151668694","https://openalex.org/W2166778460","https://openalex.org/W2207233201","https://openalex.org/W2221643708","https://openalex.org/W2403248509","https://openalex.org/W2512350220","https://openalex.org/W2524064595","https://openalex.org/W2614052576","https://openalex.org/W2618973131","https://openalex.org/W2756672502","https://openalex.org/W2773454665","https://openalex.org/W2823310453","https://openalex.org/W2898173429","https://openalex.org/W2909950944","https://openalex.org/W2943074664","https://openalex.org/W2943220429","https://openalex.org/W2963691377","https://openalex.org/W3013463124","https://openalex.org/W3116877279","https://openalex.org/W3152893301","https://openalex.org/W3155888154","https://openalex.org/W4213366026","https://openalex.org/W4224909990","https://openalex.org/W4245958820","https://openalex.org/W4285291849","https://openalex.org/W6761665040","https://openalex.org/W6794534400","https://openalex.org/W6810106769","https://openalex.org/W6849086845"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W4391584122","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W1500594134","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W4321062229"],"abstract_inverted_index":{"Trojan":[0,19,53,67,98,102,161],"horses":[1],"represent":[2],"a":[3,16],"major":[4],"threat":[5],"to":[6,83,159],"hardware":[7,18,97],"security":[8],"and":[9,39,50,70,100,120,125,134,163],"trust.":[10],"In":[11],"this":[12],"work,":[13],"we":[14,78],"propose":[15],"novel":[17],"detection":[20,115],"method":[21,112],"based":[22],"on":[23,73],"explainable":[24,149],"graph":[25],"neural":[26],"networks":[27],"(GNNs)":[28],"targeting":[29],"FPGA":[30,129,138],"netlists.":[31],"We":[32],"leverage":[33],"the":[34,74,85,110,147,154,168],"rich":[35],"explicit":[36],"structural":[37],"features":[38],"behavioral":[40],"characteristics":[41],"at":[42],"LUT,":[43],"which":[44],"offers":[45],"an":[46,80],"ideal":[47],"abstraction":[48],"level":[49],"granularity":[51],"for":[52,65,127,136,167],"detection.":[54],"A":[55],"GNN":[56,90,169],"model":[57],"with":[58,117],"optimized":[59],"class-balanced":[60],"focal":[61],"loss":[62],"is":[63],"trained":[64],"automated":[66],"feature":[68],"extraction":[69],"classification.":[71],"Based":[72],"Granger":[75],"causality":[76],"theory,":[77],"develop":[79],"interpretable":[81,165],"approach":[82,150],"explain":[84],"decision":[86],"mechanism":[87],"of":[88,122],"our":[89],"model.":[91,170],"Experimental":[92],"evaluations":[93],"using":[94],"927":[95],"Trust-Hub":[96],"benchmarks":[99],"262":[101],"free":[103],"open":[104],"source":[105],"IP":[106],"cores":[107],"show":[108],"that":[109,146,157],"proposed":[111,148],"provides":[113],"promising":[114],"results":[116,143],"accuracy,":[118],"precision":[119],"F1-measure":[121],"98.78%,":[123],"99.69%":[124],"99.23%":[126],"Xilinx":[128],"netlists":[130,139],"while":[131],"97.93%,":[132],"97.87%":[133],"98.51%":[135],"Intel":[137],"respectively.":[140],"The":[141],"experiment":[142],"have":[144],"demonstrated":[145],"can":[151],"successfully":[152],"identify":[153],"essential":[155],"components":[156],"contribute":[158],"accurate":[160],"classification":[162],"provide":[164],"explanation":[166]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
