{"id":"https://openalex.org/W4389162783","doi":"https://doi.org/10.1109/iccad57390.2023.10323655","title":"Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection","display_name":"Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection","publication_year":2023,"publication_date":"2023-10-28","ids":{"openalex":"https://openalex.org/W4389162783","doi":"https://doi.org/10.1109/iccad57390.2023.10323655"},"language":"en","primary_location":{"id":"doi:10.1109/iccad57390.2023.10323655","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad57390.2023.10323655","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062284010","display_name":"Rahul Vishwakarma","orcid":"https://orcid.org/0000-0001-6452-1612"},"institutions":[{"id":"https://openalex.org/I59897056","display_name":"California State University, Long Beach","ror":"https://ror.org/0080fxk18","country_code":"US","type":"education","lineage":["https://openalex.org/I59897056"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rahul Vishwakarma","raw_affiliation_strings":["California State University Long Beach,Computer Engineering &#x0026; Computer Science Department,Long Beach,CA,USA"],"affiliations":[{"raw_affiliation_string":"California State University Long Beach,Computer Engineering &#x0026; Computer Science Department,Long Beach,CA,USA","institution_ids":["https://openalex.org/I59897056"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013526466","display_name":"Amin Rezaei","orcid":"https://orcid.org/0000-0002-7469-3642"},"institutions":[{"id":"https://openalex.org/I59897056","display_name":"California State University, Long Beach","ror":"https://ror.org/0080fxk18","country_code":"US","type":"education","lineage":["https://openalex.org/I59897056"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amin Rezaei","raw_affiliation_strings":["California State University Long Beach,Computer Engineering &#x0026; Computer Science Department,Long Beach,CA,USA"],"affiliations":[{"raw_affiliation_string":"California State University Long Beach,Computer Engineering &#x0026; Computer Science Department,Long Beach,CA,USA","institution_ids":["https://openalex.org/I59897056"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5062284010"],"corresponding_institution_ids":["https://openalex.org/I59897056"],"apc_list":null,"apc_paid":null,"fwci":1.8481,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.85395729,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"01","last_page":"09"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7688230276107788},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.6217138171195984},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.5864129662513733},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5610776543617249},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.525565505027771},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5225591063499451},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.46723681688308716},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45183098316192627},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.4300777018070221},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3818429112434387},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3665791153907776},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24457651376724243}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7688230276107788},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.6217138171195984},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.5864129662513733},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5610776543617249},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.525565505027771},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5225591063499451},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.46723681688308716},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45183098316192627},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.4300777018070221},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3818429112434387},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3665791153907776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24457651376724243},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccad57390.2023.10323655","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad57390.2023.10323655","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G649575746","display_name":null,"funder_award_id":"2245247","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W1786598644","https://openalex.org/W1991285543","https://openalex.org/W2015290844","https://openalex.org/W2018722509","https://openalex.org/W2069858642","https://openalex.org/W2076167958","https://openalex.org/W2171585602","https://openalex.org/W2350778671","https://openalex.org/W2724859555","https://openalex.org/W2756703387","https://openalex.org/W2925197357","https://openalex.org/W2943074664","https://openalex.org/W2948194985","https://openalex.org/W2950146876","https://openalex.org/W2989596816","https://openalex.org/W2995468089","https://openalex.org/W2997754991","https://openalex.org/W3000731494","https://openalex.org/W3092978542","https://openalex.org/W3096831136","https://openalex.org/W3108642877","https://openalex.org/W3161920451","https://openalex.org/W3162915675","https://openalex.org/W3171121830","https://openalex.org/W3176686472","https://openalex.org/W3204656437","https://openalex.org/W4206371282","https://openalex.org/W4224069029","https://openalex.org/W4225162971","https://openalex.org/W4231702991","https://openalex.org/W4235106014","https://openalex.org/W4280581049","https://openalex.org/W4286562618","https://openalex.org/W4287585686","https://openalex.org/W4288296172","https://openalex.org/W4288373770","https://openalex.org/W4292074962","https://openalex.org/W4308338690","https://openalex.org/W4312121058","https://openalex.org/W4312121136","https://openalex.org/W4317209778","https://openalex.org/W4318686065","https://openalex.org/W4318969633","https://openalex.org/W4361012985","https://openalex.org/W4361215755","https://openalex.org/W4377969790","https://openalex.org/W4378800793","https://openalex.org/W4386071953","https://openalex.org/W4386076458","https://openalex.org/W6685112792","https://openalex.org/W6761341600","https://openalex.org/W6763087592","https://openalex.org/W6765451912","https://openalex.org/W6770054891","https://openalex.org/W6787328155","https://openalex.org/W6787959460","https://openalex.org/W6794006112","https://openalex.org/W6795040997"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W4391584122","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W1500594134","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W4321062229"],"abstract_inverted_index":{"As":[0],"the":[1,10,33,49,52,93,139,152,174,185,211],"semiconductor":[2],"industry":[3],"has":[4,22,27,197],"shifted":[5],"to":[6,39,76,91,101,126,183,209,216,222],"a":[7,29,46,60,69,99,131,147,177,180,189],"fabless":[8],"paradigm,":[9],"risk":[11],"of":[12,20,35,51,95,151,176],"hardware":[13,41,111,223],"Trojans":[14,42,83,97,112],"being":[15],"inserted":[16],"at":[17],"various":[18],"stages":[19],"production":[21],"also":[23],"increased.":[24],"Recently,":[25],"there":[26],"been":[28,198],"growing":[30],"trend":[31],"toward":[32],"use":[34],"machine":[36,153,219],"learning":[37,154,220],"solutions":[38,221],"detect":[40],"more":[43,170],"effectively,":[44],"with":[45,161],"focus":[47],"on":[48,130,200],"accuracy":[50],"model":[53],"as":[54],"an":[55,78,123],"evaluation":[56],"metric.":[57],"However,":[58],"in":[59],"high-risk":[61],"and":[62,98,121,156,203,207],"sensitive":[63],"domain,":[64],"we":[65,88,108],"cannot":[66],"accept":[67],"even":[68],"small":[70],"misclassification.":[71],"Additionally,":[72],"it":[73],"is":[74,192],"unrealistic":[75],"expect":[77],"ideal":[79],"model,":[80],"especially":[81],"when":[82],"evolve":[84],"over":[85,149],"time.":[86],"Therefore,":[87],"need":[89],"metrics":[90],"assess":[92],"trustworthiness":[94],"detected":[96,167],"mechanism":[100],"simulate":[102],"unseen":[103],"ones.":[104],"In":[105,173],"this":[106],"paper,":[107],"generate":[109],"evolving":[110],"using":[113],"our":[114],"proposed":[115,195],"novel":[116,181],"conformalized":[117],"generative":[118],"adversarial":[119],"networks":[120],"offer":[122],"efficient":[124],"approach":[125,196],"detecting":[127],"them":[128],"based":[129],"non-invasive":[132],"algorithm-agnostic":[133],"statistical":[134],"inference":[135],"framework":[136],"that":[137],"leverages":[138],"Mondrian":[140],"conformal":[141],"predictor.":[142],"The":[143,194],"method":[144,182],"acts":[145],"like":[146],"wrapper":[148],"any":[150],"models":[155],"produces":[157],"set":[158],"predictions":[159],"along":[160],"uncertainty":[162],"quantification":[163],"for":[164,169,213],"each":[165],"new":[166],"Trojan":[168],"robust":[171],"decision-making.":[172],"case":[175],"NULL":[178],"set,":[179],"reject":[184],"decision":[186],"by":[187],"providing":[188],"calibrated":[190],"explainability":[191],"discussed.":[193],"validated":[199],"both":[201],"synthetic":[202],"real":[204],"chip-level":[205],"benchmarks":[206],"proven":[208],"pave":[210],"way":[212],"researchers":[214],"looking":[215],"find":[217],"informed":[218],"security":[224],"problems.":[225]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
