{"id":"https://openalex.org/W2537385619","doi":"https://doi.org/10.1145/2966986.2967050","title":"KCAD","display_name":"KCAD","publication_year":2016,"publication_date":"2016-10-18","ids":{"openalex":"https://openalex.org/W2537385619","doi":"https://doi.org/10.1145/2966986.2967050","mag":"2537385619"},"language":"en","primary_location":{"id":"doi:10.1145/2966986.2967050","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2966986.2967050","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th International Conference on Computer-Aided Design","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047567173","display_name":"Sujit Rokka Chhetri","orcid":"https://orcid.org/0000-0002-7067-6984"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]},{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sujit Rokka Chhetri","raw_affiliation_strings":["University of California","Department of Electrical Engineering and Computer Science, University of California, Irvine, USA"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]},{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of California, Irvine, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033926501","display_name":"Arquimedes Canedo","orcid":"https://orcid.org/0000-0003-3506-6563"},"institutions":[{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]},{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arquimedes Canedo","raw_affiliation_strings":["University of California","Department of Electrical Engineering and Computer Science, University of California, Irvine, USA"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]},{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of California, Irvine, USA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055814180","display_name":"Mohammad Abdullah Al Faruque","orcid":"https://orcid.org/0000-0002-5390-0497"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]},{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Abdullah Al Faruque","raw_affiliation_strings":["University of California","Department of Electrical Engineering and Computer Science, University of California, Irvine, USA"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]},{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of California, Irvine, USA","institution_ids":["https://openalex.org/I204250578"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047567173"],"corresponding_institution_ids":["https://openalex.org/I204250578","https://openalex.org/I2803209242"],"apc_list":null,"apc_paid":null,"fwci":13.2441,"has_fulltext":false,"cited_by_count":101,"citation_normalized_percentile":{"value":0.992571,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10783","display_name":"Additive Manufacturing and 3D Printing Technologies","score":0.9553999900817871,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.953499972820282,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6340993642807007},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6144161224365234},{"id":"https://openalex.org/keywords/kinetic-energy","display_name":"Kinetic energy","score":0.521776020526886},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4757394790649414},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.45613154768943787},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.423678994178772},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41252508759498596},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3916522264480591},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3685082197189331},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16987308859825134},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.14095669984817505},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09004053473472595},{"id":"https://openalex.org/keywords/aerospace-engineering","display_name":"Aerospace engineering","score":0.08050861954689026}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6340993642807007},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6144161224365234},{"id":"https://openalex.org/C135889238","wikidata":"https://www.wikidata.org/wiki/Q46276","display_name":"Kinetic energy","level":2,"score":0.521776020526886},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4757394790649414},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.45613154768943787},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.423678994178772},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41252508759498596},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3916522264480591},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3685082197189331},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16987308859825134},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.14095669984817505},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09004053473472595},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.08050861954689026},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2966986.2967050","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2966986.2967050","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th International Conference on Computer-Aided Design","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5387912885","display_name":null,"funder_award_id":"CNS-1546993","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W596210739","https://openalex.org/W643820198","https://openalex.org/W1557652964","https://openalex.org/W1586219442","https://openalex.org/W1994212840","https://openalex.org/W2012374927","https://openalex.org/W2106513074","https://openalex.org/W2116520617","https://openalex.org/W2119759435","https://openalex.org/W2151261412","https://openalex.org/W2161630727","https://openalex.org/W2210563311","https://openalex.org/W2270997427","https://openalex.org/W2281919201","https://openalex.org/W2394673797","https://openalex.org/W2403211866","https://openalex.org/W3028818932","https://openalex.org/W3042657213","https://openalex.org/W4241915324","https://openalex.org/W4244075691","https://openalex.org/W4249770122","https://openalex.org/W4285719527","https://openalex.org/W6600903635","https://openalex.org/W6633700010","https://openalex.org/W6682370706"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W2358245908","https://openalex.org/W2974890647","https://openalex.org/W4385452087","https://openalex.org/W4321484089","https://openalex.org/W2296060994","https://openalex.org/W4304097726","https://openalex.org/W4304097727","https://openalex.org/W2177488045","https://openalex.org/W3123953333"],"abstract_inverted_index":{"Additive":[0],"Manufacturing":[1],"(AM)":[2],"uses":[3],"Cyber-Physical":[4],"Systems":[5],"(CPS)":[6],"(e.g.,":[7],"3D":[8,42,207],"Printers)":[9],"that":[10,125,155],"are":[11,32],"vulnerable":[12],"to":[13,21,65,128,172,184,201,224,231],"kinetic":[14,30,131,188,238],"cyber-attacks.":[15],"Kinetic":[16],"cyber-attacks":[17,31,132,189],"cause":[18],"physical":[19],"damage":[20],"the":[22,25,38,41,49,53,67,70,73,95,112,146,157,160,164,174,177,206,219,226],"system":[23],"from":[24,94],"cyber":[26,166],"domain.":[27],"In":[28,56],"AM,":[29,77,116],"realized":[33],"by":[34,135,151],"introducing":[35],"flaws":[36,45],"in":[37,76,82,115,190],"design":[39],"of":[40,52,72,97,145,176,205,221,228,237],"objects.":[43,55],"These":[44,196],"may":[46],"eventually":[47],"compromise":[48],"structural":[50],"integrity":[51,71],"printed":[54],"CPS,":[57],"researchers":[58],"have":[59,99],"designed":[60],"various":[61,203],"attack":[62,78,108,122],"detection":[63,79,123],"method":[64,80,124,180,223],"detect":[66,129,185,225],"attacks":[68,197],"on":[69,133],"system.":[74,178],"However,":[75],"is":[81,126,149,240],"its":[83],"infancy.":[84],"Moreover,":[85],"analog":[86,138,161],"emissions":[87,139,162],"(such":[88,169],"as":[89,104,142,170,210,218,234],"acoustics,":[90],"electromagnetic":[91],"emissions,":[92],"etc.)":[93],"side-channels":[96],"AM":[98,134],"not":[100],"been":[101,182],"fully":[102],"considered":[103],"a":[105,120,235],"parameter":[106],"for":[107],"detection.":[109],"To":[110],"aid":[111],"security":[113],"research":[114],"this":[117],"paper":[118],"presents":[119],"novel":[121],"able":[127],"zero-day":[130,187],"identifying":[136],"anomalous":[137],"which":[140],"arise":[141],"an":[143],"outcome":[144],"attack.":[147],"This":[148],"achieved":[150],"statistically":[152],"estimating":[153],"functions":[154],"map":[156],"relation":[158],"between":[159],"and":[163,213],"corresponding":[165],"domain":[167],"data":[168],"G-code)":[171],"model":[173],"behavior":[175],"Our":[179],"has":[181],"tested":[183],"potential":[186],"fused":[191],"deposition":[192],"modeling":[193],"based":[194],"AM.":[195],"can":[198],"physically":[199],"manifest":[200],"change":[202],"parameters":[204,233],"object,":[208],"such":[209],"speed,":[211],"dimension,":[212],"movement":[214],"axis.":[215],"Accuracy,":[216],"defined":[217],"capability":[220],"our":[222],"range":[227],"variations":[229],"introduced":[230],"these":[232],"result":[236],"cyber-attacks,":[239],"77.45%.":[241]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":17},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":12}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-10-28T00:00:00"}
