{"id":"https://openalex.org/W4394913762","doi":"https://doi.org/10.1145/3638782.3638793","title":"A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning","display_name":"A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning","publication_year":2023,"publication_date":"2023-12-06","ids":{"openalex":"https://openalex.org/W4394913762","doi":"https://doi.org/10.1145/3638782.3638793"},"language":"en","primary_location":{"id":"doi:10.1145/3638782.3638793","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3638782.3638793","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 13th International Conference on Communication and Network Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100625359","display_name":"Yinan Yao","orcid":"https://orcid.org/0000-0002-1127-8396"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yinan Yao","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067332736","display_name":"Chen Dong","orcid":"https://orcid.org/0000-0001-7546-3403"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Dong","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038131755","display_name":"Zhengye Xie","orcid":"https://orcid.org/0009-0009-0903-3435"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengye Xie","raw_affiliation_strings":["Maynooth International Engineering College, Fuzhou University, China"],"affiliations":[{"raw_affiliation_string":"Maynooth International Engineering College, Fuzhou University, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032430513","display_name":"Yuqing Li","orcid":"https://orcid.org/0009-0003-4029-9051"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqing Li","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052989449","display_name":"Xiaodong Guo","orcid":"https://orcid.org/0009-0004-7988-5661"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaodong Guo","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100397670","display_name":"Yang Yang","orcid":"https://orcid.org/0000-0002-7891-2670"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yang Yang","raw_affiliation_strings":["School of Computing and Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071576870","display_name":"Xiaoding Wang","orcid":"https://orcid.org/0000-0002-0494-3538"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoding Wang","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100625359"],"corresponding_institution_ids":["https://openalex.org/I80947539"],"apc_list":null,"apc_paid":null,"fwci":0.3019,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57604389,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"69","last_page":"76"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.7955299615859985},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7184940576553345},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.681193470954895},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.631047785282135},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.5013065338134766},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4700811207294464},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3319118618965149},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19929838180541992}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.7955299615859985},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7184940576553345},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.681193470954895},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.631047785282135},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.5013065338134766},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4700811207294464},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3319118618965149},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19929838180541992}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3638782.3638793","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3638782.3638793","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 13th International Conference on Communication and Network Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1538903554","display_name":null,"funder_award_id":"2020J01500, 2021J01616, 2020J01167, 2020J01169.","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"},{"id":"https://openalex.org/G6217898968","display_name":null,"funder_award_id":"62372110, 62072109, U1905211, 61702103,","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2221643708","https://openalex.org/W2790110459","https://openalex.org/W2892542130","https://openalex.org/W2910203822","https://openalex.org/W3000731494","https://openalex.org/W3047375952","https://openalex.org/W3119972824","https://openalex.org/W3143021555","https://openalex.org/W3167123936","https://openalex.org/W4206374172","https://openalex.org/W4380358461"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2091750459","https://openalex.org/W2999465529","https://openalex.org/W4328053173","https://openalex.org/W1500594134","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W1526642037"],"abstract_inverted_index":{"In":[0,82],"recent":[1],"years,":[2],"the":[3,20,24,52,94,122,132,142],"application":[4],"of":[5,23,54,96,125,159],"integrated":[6,56,123],"circuits":[7],"in":[8,51,70,152,157],"various":[9],"fields":[10],"has":[11,45,155],"become":[12,46],"more":[13,15],"and":[14,29,34,38,73,116,121,162],"extensive.":[16],"The":[17,105,137],"attackers":[18],"utilize":[19],"hidden":[21],"dangers":[22],"industrial":[25],"chain":[26],"to":[27,65,92,100],"design":[28],"launch":[30],"hardware":[31,68,88,97,133,143],"Trojan":[32,89,98,134,144],"attacks":[33],"their":[35],"attack":[36,39],"patterns":[37],"surfaces":[40],"are":[41,80],"also":[42],"evolving,":[43],"which":[44],"an":[47],"emerging":[48],"security":[49],"threat":[50],"production":[53],"modern":[55],"circuits.":[57],"Traditional":[58],"detection":[59,78,90,99,135,145,160],"methods":[60,79],"have":[61],"made":[62],"it":[63],"difficult":[64],"deal":[66],"with":[67],"Trojans":[69],"a":[71,85,108,113],"timely":[72],"effective":[74],"manner,":[75],"so":[76],"new":[77],"imminent.":[81],"this":[83,153],"paper,":[84],"deep":[86,149],"learning-based":[87],"method":[91,146],"improve":[93],"accuracy":[95,161],"some":[101],"extent":[102],"is":[103],"proposed.":[104],"paper":[106,154],"designs":[107],"convolutional":[109],"neural":[110],"network":[111,119],"(TextCNN),":[112],"bidirectional":[114],"long":[115],"short-term":[117],"memory":[118],"(Bi-LSTM),":[120],"learning":[124,150],"these":[126],"two":[127],"single":[128],"models":[129],"(TextCNN+Bi-LSTM)":[130],"as":[131],"scheme.":[136],"experimental":[138],"results":[139],"show":[140],"that":[141],"based":[147],"on":[148],"proposed":[151],"advantages":[156],"terms":[158],"robustness.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
