{"id":"https://openalex.org/W3160530040","doi":"https://doi.org/10.1109/isqed51717.2021.9424314","title":"Hardware Trojan Detection Method for Inspecting Integrated Circuits Based on Machine Learning","display_name":"Hardware Trojan Detection Method for Inspecting Integrated Circuits Based on Machine Learning","publication_year":2021,"publication_date":"2021-04-07","ids":{"openalex":"https://openalex.org/W3160530040","doi":"https://doi.org/10.1109/isqed51717.2021.9424314","mag":"3160530040"},"language":"en","primary_location":{"id":"doi:10.1109/isqed51717.2021.9424314","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed51717.2021.9424314","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101437060","display_name":"Yuze Wang","orcid":"https://orcid.org/0000-0002-8575-3508"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuze Wang","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100346916","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0003-4929-0531"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101856330","display_name":"Xiaoxia Han","orcid":"https://orcid.org/0000-0002-8046-8804"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoxia Han","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069124655","display_name":"Yingtao Jiang","orcid":"https://orcid.org/0000-0001-7453-9365"},"institutions":[{"id":"https://openalex.org/I133999245","display_name":"University of Nevada, Las Vegas","ror":"https://ror.org/0406gha72","country_code":"US","type":"education","lineage":["https://openalex.org/I133999245"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yingtao Jiang","raw_affiliation_strings":["University of Nevada Las Vegas, Las Vegas, USA"],"affiliations":[{"raw_affiliation_string":"University of Nevada Las Vegas, Las Vegas, USA","institution_ids":["https://openalex.org/I133999245"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101437060"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.6908,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.64894288,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.9529635906219482},{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.9252405762672424},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.8807963132858276},{"id":"https://openalex.org/keywords/flagging","display_name":"Flagging","score":0.7768541574478149},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6714388132095337},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.5972661375999451},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5701354742050171},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.5525868535041809},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5431304574012756},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.5241639614105225},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.49442172050476074},{"id":"https://openalex.org/keywords/counterfeit","display_name":"Counterfeit","score":0.4297041893005371},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16435647010803223},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10007646679878235}],"concepts":[{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.9529635906219482},{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.9252405762672424},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.8807963132858276},{"id":"https://openalex.org/C2777548347","wikidata":"https://www.wikidata.org/wiki/Q5456937","display_name":"Flagging","level":2,"score":0.7768541574478149},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6714388132095337},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.5972661375999451},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5701354742050171},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.5525868535041809},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5431304574012756},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.5241639614105225},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.49442172050476074},{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.4297041893005371},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16435647010803223},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10007646679878235},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isqed51717.2021.9424314","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed51717.2021.9424314","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1998461107","https://openalex.org/W2001441503","https://openalex.org/W2074123919","https://openalex.org/W2141600480","https://openalex.org/W2151668694","https://openalex.org/W2189470380","https://openalex.org/W2282606083","https://openalex.org/W2295598076","https://openalex.org/W2464661970","https://openalex.org/W2524064595","https://openalex.org/W2536483783","https://openalex.org/W2753199827","https://openalex.org/W2756672502","https://openalex.org/W2778752735","https://openalex.org/W2943074664","https://openalex.org/W2943143580","https://openalex.org/W3043809678","https://openalex.org/W3083630055","https://openalex.org/W3102476541","https://openalex.org/W4252148401","https://openalex.org/W6669040108"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W2795151239","https://openalex.org/W2800991926","https://openalex.org/W2724859555","https://openalex.org/W3160241274","https://openalex.org/W2536483783","https://openalex.org/W3040363299","https://openalex.org/W3114336057","https://openalex.org/W2756672502","https://openalex.org/W2903337714"],"abstract_inverted_index":{"Nowadays":[0],"malicious":[1],"vendors":[2],"can":[3,70,94],"easily":[4],"insert":[5],"hardware":[6,39,78,87,181],"Trojans":[7],"into":[8],"integrated":[9,15,149],"circuit":[10,51,150],"chips":[11],"as":[12,73],"the":[13,74,99,109,120,131,145,148,164,170],"entire":[14,100],"chip":[16,101],"supply":[17],"chain":[18],"involves":[19],"numerous":[20],"design":[21],"houses":[22],"and":[23,57,91,118,153],"manufacturers":[24],"on":[25],"a":[26,33,46,55,58,64,77,85],"global":[27],"scale.":[28],"It":[29],"is":[30,52],"thereby":[31],"becoming":[32],"necessity":[34],"to":[35,97,124,130,139,178],"expose":[36],"any":[37],"possible":[38],"Trojans,":[40,182],"if":[41],"they":[42],"ever":[43],"exist":[44],"in":[45,80,157],"chip.":[47],"A":[48],"typical":[49],"Trojan":[50,88],"made":[53],"of":[54,76,147,159,188],"trigger":[56,65,68,103,132,142],"payload":[59],"that":[60,93],"are":[61,137],"interconnected":[62],"with":[63,169,183],"net.":[66],"As":[67],"net":[69,114,156],"be":[71,95,176],"viewed":[72],"signature":[75],"Trojan,":[79],"this":[81],"paper,":[82],"we":[83,107,174],"propose":[84],"gate-level":[86],"detection":[89,127,135],"method":[90,123],"model":[92],"applied":[96],"screen":[98],"for":[102,112],"nets.":[104],"In":[105],"specific,":[106],"extract":[108],"trigger-net":[110],"features":[111],"each":[113,155],"from":[115,144],"known":[116],"netlists":[117],"use":[119],"machine":[121],"learning":[122],"train":[125],"multiple":[126],"models":[128,136],"according":[129],"modes.":[133],"The":[134],"used":[138],"identify":[140],"suspicious":[141,167],"nets":[143,168],"netlist":[146],"under":[151],"detection,":[152],"score":[154],"terms":[158],"suspiciousness":[160,172],"value.":[161],"By":[162],"flagging":[163],"top":[165],"2%":[166],"highest":[171],"values,":[173],"shall":[175],"able":[177],"detect":[179],"majority":[180],"an":[184],"average":[185],"accuracy":[186],"rate":[187],"96%.":[189]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
