{"id":"https://openalex.org/W3010443526","doi":"https://doi.org/10.1109/iscas45731.2020.9180479","title":"A Novel Feature Extraction Strategy for Hardware Trojan Detection","display_name":"A Novel Feature Extraction Strategy for Hardware Trojan Detection","publication_year":2020,"publication_date":"2020-09-29","ids":{"openalex":"https://openalex.org/W3010443526","doi":"https://doi.org/10.1109/iscas45731.2020.9180479","mag":"3010443526"},"language":"en","primary_location":{"id":"doi:10.1109/iscas45731.2020.9180479","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas45731.2020.9180479","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pureadmin.qub.ac.uk/ws/files/200924927/PID6328543.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100723817","display_name":"Shichao Yu","orcid":"https://orcid.org/0000-0001-8861-1671"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shichao Yu","raw_affiliation_strings":["Centre for Secure Information Technologies, ECIT, Queen&#x0027;s University Belfast, Belfast, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, ECIT, Queen&#x0027;s University Belfast, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089292929","display_name":"Chongyan Gu","orcid":"https://orcid.org/0000-0002-3028-8004"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chongyan Gu","raw_affiliation_strings":["Centre for Secure Information Technologies, ECIT, Queen&#x0027;s University Belfast, Belfast, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, ECIT, Queen&#x0027;s University Belfast, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064498852","display_name":"Weiqiang Liu","orcid":"https://orcid.org/0000-0002-2429-8791"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiqiang Liu","raw_affiliation_strings":["College of EIE, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of EIE, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079438004","display_name":"M\u00e1ire O\u05f3Neill","orcid":"https://orcid.org/0000-0002-6865-6212"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Maire O'Neill","raw_affiliation_strings":["Centre for Secure Information Technologies, ECIT, Queen&#x0027;s University Belfast, Belfast, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, ECIT, Queen&#x0027;s University Belfast, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100723817"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":3.5359,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.93077682,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6896363496780396},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.661062479019165},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5795498490333557},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.561047375202179},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4782242476940155},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.44092386960983276},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4232538640499115},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4189518094062805},{"id":"https://openalex.org/keywords/integrated-circuit-design","display_name":"Integrated circuit design","score":0.41692298650741577},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.41027626395225525},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40420010685920715},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3564547598361969},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09388437867164612}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6896363496780396},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.661062479019165},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5795498490333557},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.561047375202179},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4782242476940155},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.44092386960983276},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4232538640499115},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4189518094062805},{"id":"https://openalex.org/C74524168","wikidata":"https://www.wikidata.org/wiki/Q1074539","display_name":"Integrated circuit design","level":2,"score":0.41692298650741577},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.41027626395225525},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40420010685920715},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3564547598361969},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09388437867164612},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iscas45731.2020.9180479","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas45731.2020.9180479","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/84d4f01c-c592-4a3d-afec-c4f4cca27a4f","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/84d4f01c-c592-4a3d-afec-c4f4cca27a4f","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/200924927/PID6328543.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Yu, S, Gu, C, Liu, W & O'Neill, M 2020, A Novel Feature Extraction Strategy for Hardware Trojan Detection. in The IEEE International Symposium on Circuits and Systems (ISCAS): Proceedings. IEEE International Symposium on Circuits and Systems (ISCAS): Proceedings, Institute of Electrical and Electronics Engineers Inc., The IEEE International Symposium on Circuits and Systems 2020, 10/10/2020. https://doi.org/10.1109/ISCAS45731.2020.9180479","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/84d4f01c-c592-4a3d-afec-c4f4cca27a4f","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/84d4f01c-c592-4a3d-afec-c4f4cca27a4f","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/200924927/PID6328543.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Yu, S, Gu, C, Liu, W & O'Neill, M 2020, A Novel Feature Extraction Strategy for Hardware Trojan Detection. in The IEEE International Symposium on Circuits and Systems (ISCAS): Proceedings. IEEE International Symposium on Circuits and Systems (ISCAS): Proceedings, Institute of Electrical and Electronics Engineers Inc., The IEEE International Symposium on Circuits and Systems 2020, 10/10/2020. https://doi.org/10.1109/ISCAS45731.2020.9180479","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G2026865516","display_name":null,"funder_award_id":"1943868","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G2241406505","display_name":null,"funder_award_id":"EP/R007187/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5861171589","display_name":"DeepSecurity - Applying Deep Learning to Hardware Security","funder_award_id":"EP/R011494/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6577499357","display_name":null,"funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G767073614","display_name":null,"funder_award_id":"EP/R011494/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3010443526.pdf","grobid_xml":"https://content.openalex.org/works/W3010443526.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W2153635508","https://openalex.org/W2524064595","https://openalex.org/W2536483783","https://openalex.org/W2606854262","https://openalex.org/W2750067007","https://openalex.org/W2756672502","https://openalex.org/W2756703387","https://openalex.org/W2905755717","https://openalex.org/W2918106286","https://openalex.org/W2929926416","https://openalex.org/W2943143580","https://openalex.org/W2973295486","https://openalex.org/W2980117423"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W1500594134","https://openalex.org/W2091750459","https://openalex.org/W2999465529","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W1526642037","https://openalex.org/W4321062229"],"abstract_inverted_index":{"Hardware":[0],"Trojans":[1,185],"(HTs)":[2],"are":[3,43,59,109],"acknowledged":[4],"as":[5,39],"a":[6,89],"significant":[7],"emerging":[8],"security":[9],"concern":[10],"in":[11,31,65,119,173],"the":[12,17,20,28,50,62,66,104,112,140,156,161],"IC":[13,57,76],"industry":[14],"resulting":[15],"from":[16,61,74,111,146],"globalization":[18],"of":[19,27,55,160],"semiconductor":[21],"supply":[22],"chain.":[23],"Recently,":[24],"taking":[25],"advantage":[26],"exponential":[29],"growth":[30],"computing":[32],"power,":[33],"machine":[34,127],"learning":[35],"(ML)":[36],"approaches":[37,83],"such":[38],"neural":[40],"networks":[41],"(NNs)":[42],"being":[44],"considered":[45],"for":[46,134],"HT":[47,72,91,107,129,144,151,163],"detection.":[48],"However,":[49],"circuit":[51,98,113],"structure":[52],"and":[53,78,137,150,158,186],"components":[54],"an":[56],"design":[58],"different":[60],"data":[63,135],"types":[64],"ML":[67],"models.":[68],"To":[69],"efficiently":[70],"extract":[71],"features":[73,108,142],"complex":[75],"designs":[77],"utilize":[79],"common":[80],"ML-based":[81],"detection":[82,130,168],"is":[84,100,132],"challenging.":[85],"In":[86],"this":[87],"paper,":[88],"novel":[90],"feature":[92,164],"extraction":[93,165],"strategy":[94],"based":[95],"on":[96,143,183,188],"gate-level":[97],"netlists":[99],"proposed":[101,162],"to":[102,154],"tackle":[103],"challenges.":[105],"The":[106,167],"extracted":[110,141],"topology":[114],"rather":[115],"than":[116],"statistical":[117],"analysis":[118],"previous":[120],"research.":[121],"A":[122],"commonly":[123],"utilized":[124],"support":[125],"vector":[126],"(SVM)-based":[128],"model":[131],"employed":[133],"training":[136],"testing":[138],"using":[139],"benchmarks":[145],"both":[147],"open-sourced":[148],"library":[149],"generation":[152],"platform":[153],"prove":[155],"feasibility":[157],"efficiency":[159],"strategy.":[166],"results":[169],"show":[170],"high":[171],"recall":[172,182],"nearly":[174],"all":[175],"tested":[176],"benchmarks,":[177],"achieving":[178],"at":[179],"most":[180],"97.7%":[181],"sequential":[184],"84.8%":[187],"combinational":[189],"ones.":[190]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
