{"id":"https://openalex.org/W3202391847","doi":"https://doi.org/10.1109/tetc.2021.3116484","title":"Deep Learning-Based Hardware Trojan Detection With Block-Based Netlist Information Extraction","display_name":"Deep Learning-Based Hardware Trojan Detection With Block-Based Netlist Information Extraction","publication_year":2021,"publication_date":"2021-10-06","ids":{"openalex":"https://openalex.org/W3202391847","doi":"https://doi.org/10.1109/tetc.2021.3116484","mag":"3202391847"},"language":"en","primary_location":{"id":"doi:10.1109/tetc.2021.3116484","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2021.3116484","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.qub.ac.uk/en/publications/fdd2ebd3-e336-4343-b16d-b8599f853201","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100723817","display_name":"Shichao Yu","orcid":"https://orcid.org/0000-0001-8861-1671"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shichao Yu","raw_affiliation_strings":["Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen&#x0027;s University Belfast, Belfast, U.K"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen&#x0027;s University Belfast, Belfast, U.K","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089292929","display_name":"Chongyan Gu","orcid":"https://orcid.org/0000-0002-3028-8004"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chongyan Gu","raw_affiliation_strings":["Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen&#x0027;s University Belfast, Belfast, U.K"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen&#x0027;s University Belfast, Belfast, U.K","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023734605","display_name":"Weiqiang Liu","orcid":"https://orcid.org/0000-0001-8398-8648"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiqiang Liu","raw_affiliation_strings":["College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079438004","display_name":"M\u00e1ire O\u05f3Neill","orcid":"https://orcid.org/0000-0002-6865-6212"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Maire O'Neill","raw_affiliation_strings":["Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen&#x0027;s University Belfast, Belfast, U.K"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies, Institute of Electronics, Communications, and Information Technology, Queen&#x0027;s University Belfast, Belfast, U.K","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100723817"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":3.5371,"has_fulltext":true,"cited_by_count":33,"citation_normalized_percentile":{"value":0.93194359,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"10","issue":"4","first_page":"1837","last_page":"1853"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9732999801635742,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.8779433965682983},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7985725402832031},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.6664414405822754},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5121607780456543},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.49930739402770996},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.4906105101108551},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.46847429871559143},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39826086163520813},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.38030731678009033},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3432488739490509},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09570220112800598}],"concepts":[{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.8779433965682983},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7985725402832031},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.6664414405822754},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5121607780456543},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.49930739402770996},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.4906105101108551},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.46847429871559143},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39826086163520813},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.38030731678009033},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3432488739490509},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09570220112800598}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tetc.2021.3116484","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2021.3116484","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/fdd2ebd3-e336-4343-b16d-b8599f853201","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/fdd2ebd3-e336-4343-b16d-b8599f853201","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Yu, S, Gu, C, Liu, W & O'Neill, M 2021, 'Deep Learning-based Hardware Trojan Detection with Block-based Netlist Information Extraction', IEEE Transactions on Emerging Topics in Computing (TETC) . https://doi.org/10.1109/TETC.2021.3116484","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/fdd2ebd3-e336-4343-b16d-b8599f853201","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/fdd2ebd3-e336-4343-b16d-b8599f853201","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Yu, S, Gu, C, Liu, W & O'Neill, M 2021, 'Deep Learning-based Hardware Trojan Detection with Block-based Netlist Information Extraction', IEEE Transactions on Emerging Topics in Computing (TETC) . https://doi.org/10.1109/TETC.2021.3116484","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4070429046","display_name":null,"funder_award_id":"62022041","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5861171589","display_name":"DeepSecurity - Applying Deep Learning to Hardware Security","funder_award_id":"EP/R011494/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6311684539","display_name":null,"funder_award_id":"202204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G767073614","display_name":null,"funder_award_id":"EP/R011494/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G987089066","display_name":null,"funder_award_id":"2022041","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W76123274","https://openalex.org/W1591013007","https://openalex.org/W1614298861","https://openalex.org/W2106366482","https://openalex.org/W2112796928","https://openalex.org/W2122509673","https://openalex.org/W2145937629","https://openalex.org/W2151668694","https://openalex.org/W2153579005","https://openalex.org/W2207233201","https://openalex.org/W2402268235","https://openalex.org/W2524064595","https://openalex.org/W2536483783","https://openalex.org/W2606854262","https://openalex.org/W2750067007","https://openalex.org/W2756672502","https://openalex.org/W2756703387","https://openalex.org/W2789876780","https://openalex.org/W2798312912","https://openalex.org/W2943433132","https://openalex.org/W3000011546","https://openalex.org/W3010443526","https://openalex.org/W3036926273","https://openalex.org/W3119894045","https://openalex.org/W4294170691","https://openalex.org/W6636510571","https://openalex.org/W6682691769","https://openalex.org/W6789017474"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W2795151239","https://openalex.org/W2724859555","https://openalex.org/W3160241274","https://openalex.org/W2800991926","https://openalex.org/W2536483783","https://openalex.org/W3040363299","https://openalex.org/W4292862463","https://openalex.org/W2756672502","https://openalex.org/W2903337714"],"abstract_inverted_index":{"With":[0],"the":[1,4,68,124,148,151,169,177,215],"globalization":[2],"of":[3,39,51,92],"semiconductor":[5],"industry,":[6],"hardware":[7],"Trojans":[8],"(HTs)":[9],"are":[10,140],"an":[11],"emergent":[12],"security":[13],"threat":[14],"in":[15,75,168],"modern":[16],"integrated":[17],"circuit":[18],"(IC)":[19],"production.":[20],"Research":[21],"is":[22],"now":[23],"being":[24],"conducted":[25],"into":[26],"designing":[27],"more":[28],"accurate":[29],"and":[30,60,134,156,190,197,204],"efficient":[31],"methods":[32],"to":[33,57,65,71,163],"detect":[34],"HTs.":[35],"Recently,":[36],"a":[37,80,127],"number":[38],"machine":[40],"learning":[41,113],"(ML)-based":[42],"HT":[43,82,115,119,152,179,218],"detection":[44,69,83,116,144,180,196,210],"approaches":[45,56],"have":[46],"been":[47,161],"proposed;":[48],"however,":[49],"most":[50],"them":[52],"still":[53],"use":[54,62],"knowledge-driven":[55],"design":[58],"features":[59],"often":[61],"engineering":[63],"intuition":[64],"carefully":[66],"craft":[67],"model":[70,133,139],"improve":[72],"accuracy.":[73],"Therefore,":[74],"this":[76],"work,":[77],"we":[78],"propose":[79],"data-driven":[81],"system":[84,90,181],"based":[85],"on":[86,150],"gate-level":[87],"netlists.":[88],"The":[89,172],"consists":[91],"four":[93],"main":[94],"parts:":[95],"1)":[96],"Information":[97],"extraction":[98],"from":[99,154],"netlist":[100,109],"block;":[101],"2)":[102],"Natural":[103],"language":[104],"processing":[105],"(NLP)":[106],"for":[107,193,207],"translating":[108],"information;":[110],"3)":[111],"Deel":[112],"(DL)-based":[114],"model;":[117],"4)":[118],"component":[120],"final":[121],"voter.":[122],"In":[123],"experiments,":[125],"both":[126],"long":[128],"short-term":[129],"memory":[130],"networks":[131],"(LSTM)":[132],"convolutional":[135],"neural":[136],"network":[137],"(CNN)":[138],"used":[141],"as":[142],"our":[143],"models.":[145],"We":[146],"performed":[147],"experiments":[149],"benchmarks":[153,219],"Trust-hub":[155],"K-fold":[157],"crossing":[158],"verification":[159],"has":[160],"applied":[162],"evaluate":[164],"different":[165],"parameter":[166],"settings":[167],"training":[170],"procedure.":[171],"experimental":[173],"results":[174],"show":[175],"that":[176],"proposed":[178],"can":[182],"achieve":[183],"79.29%":[184],"TPR,":[185,199],"99.97%":[186],"TNR,":[187,201],"87.75%":[188],"PPV":[189,203],"99.94%":[191],"NPV":[192,206],"combinational":[194],"Trojan":[195,209],"93.46%":[198],"99.99%":[200],"98.92%":[202],"99.92%":[205],"sequential":[208],"after":[211],"voting-based":[212],"optimization":[213],"using":[214],"LEDA":[216],"library-based":[217],"(":[220],"<italic":[221],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[222],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">logic_level</i>":[223],"=4,":[224],"upsampling,":[225],"LSTM,":[226],"5":[227],"epochs).":[228]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
