{"id":"https://openalex.org/W4297337466","doi":"https://doi.org/10.1109/iolts56730.2022.9897557","title":"Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists","display_name":"Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists","publication_year":2022,"publication_date":"2022-09-12","ids":{"openalex":"https://openalex.org/W4297337466","doi":"https://doi.org/10.1109/iolts56730.2022.9897557"},"language":"en","primary_location":{"id":"doi:10.1109/iolts56730.2022.9897557","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts56730.2022.9897557","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051815128","display_name":"Kazuki Yamashita","orcid":null},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kazuki Yamashita","raw_affiliation_strings":["Waseda University,Department of Computer Science and Communications Engineering","Department of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Waseda University,Department of Computer Science and Communications Engineering","institution_ids":["https://openalex.org/I150744194"]},{"raw_affiliation_string":"Department of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101831979","display_name":"Tomohiro Kato","orcid":"https://orcid.org/0000-0001-5878-5320"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tomohiro Kato","raw_affiliation_strings":["Waseda University,Department of Computer Science and Communications Engineering","Department of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Waseda University,Department of Computer Science and Communications Engineering","institution_ids":["https://openalex.org/I150744194"]},{"raw_affiliation_string":"Department of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066000044","display_name":"Kento Hasegawa","orcid":"https://orcid.org/0000-0002-6517-1703"},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kento Hasegawa","raw_affiliation_strings":["KDDI Research, Inc"],"affiliations":[{"raw_affiliation_string":"KDDI Research, Inc","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052844875","display_name":"Seira Hidano","orcid":"https://orcid.org/0009-0006-0571-7168"},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Seira Hidano","raw_affiliation_strings":["KDDI Research, Inc"],"affiliations":[{"raw_affiliation_string":"KDDI Research, Inc","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014137807","display_name":"Kazuhide Fukushima","orcid":"https://orcid.org/0000-0003-2571-0116"},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazuhide Fukushima","raw_affiliation_strings":["KDDI Research, Inc"],"affiliations":[{"raw_affiliation_string":"KDDI Research, Inc","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087516286","display_name":"Nozomu Togawa","orcid":"https://orcid.org/0000-0003-3400-3587"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Nozomu Togawa","raw_affiliation_strings":["Waseda University,Department of Computer Science and Communications Engineering","Department of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Waseda University,Department of Computer Science and Communications Engineering","institution_ids":["https://openalex.org/I150744194"]},{"raw_affiliation_string":"Department of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5051815128"],"corresponding_institution_ids":["https://openalex.org/I150744194"],"apc_list":null,"apc_paid":null,"fwci":1.3623,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.79508654,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.8087401390075684},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.7953723669052124},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6984738707542419},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6724199056625366},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6319825649261475},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.49014052748680115},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.48266270756721497},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.48090505599975586},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.47404977679252625},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4328905940055847},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.4297170341014862},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.41379380226135254},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37668201327323914},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3383563458919525},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17929819226264954},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1747114658355713},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.08540552854537964}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.8087401390075684},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.7953723669052124},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6984738707542419},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6724199056625366},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6319825649261475},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.49014052748680115},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.48266270756721497},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.48090505599975586},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.47404977679252625},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4328905940055847},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.4297170341014862},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.41379380226135254},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37668201327323914},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3383563458919525},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17929819226264954},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1747114658355713},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.08540552854537964},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iolts56730.2022.9897557","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts56730.2022.9897557","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W1500594134","https://openalex.org/W4318003314","https://openalex.org/W2120912790","https://openalex.org/W2782017703","https://openalex.org/W4248805755"],"abstract_inverted_index":{"Recently,":[0],"with":[1,20,136],"the":[2,11,44,58,67,76,108,111,114,129,132,137,151,165],"increase":[3],"in":[4,157,161],"outsourcing":[5],"of":[6,13,60,94,110],"IC":[7],"design":[8,54,119],"and":[9,121,143,148],"manufacturing,":[10],"possibility":[12],"inserting":[14],"hardware":[15,35,159],"Trojans,":[16],"which":[17],"are":[18,98,154],"circuits":[19,162],"malicious":[21],"functions,":[22],"has":[23,40],"been":[24,41],"pointed":[25],"out.":[26],"To":[27],"prevent":[28],"this":[29,91],"threat,":[30],"a":[31,85],"method":[32,87],"to":[33,56,83,101,164],"identify":[34],"Trojans":[36,160],"using":[37,131,139],"neural":[38,64],"networks":[39],"proposed.":[42],"On":[43],"other":[45],"hand,":[46],"adversarial":[47,115,166],"attacks":[48,77,116],"have":[49],"emerged":[50],"that":[51,97,150],"modify":[52],"circuit":[53,118],"information":[55,120],"reduce":[57],"accuracy":[59],"hardware-Trojan":[61,102,125],"classification":[62],"by":[63,70],"networks.":[65],"Since":[66],"features":[68,96,135],"designed":[69],"existing":[71,145],"methods":[72],"do":[73],"not":[74],"take":[75],"into":[78],"account,":[79],"it":[80],"is":[81],"necessary":[82],"consider":[84],"new":[86],"for":[88],"countermeasures.":[89],"In":[90],"paper,":[92],"out":[93],"76":[95,144],"strongly":[99],"related":[100],"features,":[103,146],"we":[104],"investigate":[105],"them":[106],"from":[107],"viewpoint":[109],"robustness":[112],"against":[113],"on":[117],"newly":[122],"propose":[123],"24":[124,134],"features.":[126],"We":[127],"compare":[128],"classifiers":[130,138],"proposed":[133,152],"11,":[140],"36,":[141],"51,":[142],"respectively":[147],"confirm":[149],"ones":[153],"more":[155],"robust":[156],"identifying":[158],"subjected":[163],"attacks.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
