{"id":"https://openalex.org/W3109300580","doi":"https://doi.org/10.1155/2020/6641844","title":"Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning","display_name":"Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning","publication_year":2020,"publication_date":"2020-11-25","ids":{"openalex":"https://openalex.org/W3109300580","doi":"https://doi.org/10.1155/2020/6641844","mag":"3109300580"},"language":"en","primary_location":{"id":"doi:10.1155/2020/6641844","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/6641844","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6641844.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/6641844.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050355537","display_name":"Jiazhong Lu","orcid":"https://orcid.org/0000-0002-8982-8255"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiazhong Lu","raw_affiliation_strings":["School of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100442739","display_name":"Xiaolei Liu","orcid":"https://orcid.org/0000-0001-8510-4025"},"institutions":[{"id":"https://openalex.org/I2801345734","display_name":"China Academy of Engineering Physics","ror":"https://ror.org/039vqpp67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I2801345734"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaolei Liu","raw_affiliation_strings":["Institute of Computer Application, China Academy of Engineering Physics, Mianyang, Sichuan 621900, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Application, China Academy of Engineering Physics, Mianyang, Sichuan 621900, China","institution_ids":["https://openalex.org/I2801345734"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020519133","display_name":"Shibin Zhang","orcid":"https://orcid.org/0000-0002-0604-2901"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shibin Zhang","raw_affiliation_strings":["School of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108240184","display_name":"Yan Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Chang","raw_affiliation_strings":["School of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Chengdu University of Information Technology, Chengdu 610225, Sichuan, China","institution_ids":["https://openalex.org/I24201400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100442739"],"corresponding_institution_ids":["https://openalex.org/I2801345734"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.2718,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65909371,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.9178946018218994},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7471820116043091},{"id":"https://openalex.org/keywords/electromagnetic-environment","display_name":"Electromagnetic environment","score":0.6940898895263672},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.6075483560562134},{"id":"https://openalex.org/keywords/electromagnetic-radiation","display_name":"Electromagnetic radiation","score":0.5261751413345337},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.44082656502723694},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.35870444774627686},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3089487850666046},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2619836926460266},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.19861626625061035}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.9178946018218994},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7471820116043091},{"id":"https://openalex.org/C64183698","wikidata":"https://www.wikidata.org/wiki/Q4530886","display_name":"Electromagnetic environment","level":2,"score":0.6940898895263672},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.6075483560562134},{"id":"https://openalex.org/C149773537","wikidata":"https://www.wikidata.org/wiki/Q12969754","display_name":"Electromagnetic radiation","level":2,"score":0.5261751413345337},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.44082656502723694},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35870444774627686},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3089487850666046},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2619836926460266},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.19861626625061035},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2020/6641844","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/6641844","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6641844.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:722c3d4060e9472fbabaf81478b54633","is_oa":true,"landing_page_url":"https://doaj.org/article/722c3d4060e9472fbabaf81478b54633","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2020/6641844","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6641844","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Review Article"}],"best_oa_location":{"id":"doi:10.1155/2020/6641844","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/6641844","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6641844.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1150217949","display_name":null,"funder_award_id":"2020YFG0307","funder_id":"https://openalex.org/F4320336596","funder_display_name":"Key Research and Development Program of Sichuan Province"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2581965587","display_name":null,"funder_award_id":"61572086","funder_id":"https://openalex.org/F4320336596","funder_display_name":"Key Research and Development Program of Sichuan Province"},{"id":"https://openalex.org/G3139267464","display_name":null,"funder_award_id":"2016120080102643","funder_id":"https://openalex.org/F4320336596","funder_display_name":"Key Research and Development Program of Sichuan Province"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3391116023","display_name":null,"funder_award_id":"2016120080102643","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4309383486","display_name":null,"funder_award_id":"201612","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5167091242","display_name":null,"funder_award_id":"No. 1","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5462680295","display_name":null,"funder_award_id":"2020YFG0307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5581235289","display_name":null,"funder_award_id":"62076042","funder_id":"https://openalex.org/F4320336596","funder_display_name":"Key Research and Development Program of Sichuan Province"},{"id":"https://openalex.org/G5584050313","display_name":null,"funder_award_id":"61572086","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5760752404","display_name":null,"funder_award_id":"Projects","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6410417166","display_name":null,"funder_award_id":"2016120","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6508296018","display_name":null,"funder_award_id":"62076042","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G652916943","display_name":null,"funder_award_id":"2018TJPT0012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6780891303","display_name":null,"funder_award_id":"17TD0009","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6819537162","display_name":null,"funder_award_id":"No. 2019-YF05-02028-GX","funder_id":"https://openalex.org/F4320336596","funder_display_name":"Key Research and Development Program of Sichuan Province"},{"id":"https://openalex.org/G7137587577","display_name":null,"funder_award_id":"2018TJPT0012","funder_id":"https://openalex.org/F4320336596","funder_display_name":"Key Research and Development Program of Sichuan Province"},{"id":"https://openalex.org/G7267649697","display_name":null,"funder_award_id":"2019-YF05-02028-GX","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7386007345","display_name":null,"funder_award_id":"2019-YF05-02028-GX","funder_id":"https://openalex.org/F4320336596","funder_display_name":"Key Research and Development Program of Sichuan Province"},{"id":"https://openalex.org/G8113295728","display_name":null,"funder_award_id":"17TD0009","funder_id":"https://openalex.org/F4320336596","funder_display_name":"Key Research and Development Program of Sichuan Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336596","display_name":"Key Research and Development Program of Sichuan Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3109300580.pdf","grobid_xml":"https://content.openalex.org/works/W3109300580.grobid-xml"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W1230022372","https://openalex.org/W2112654850","https://openalex.org/W2114636141","https://openalex.org/W2166800012","https://openalex.org/W2765085016","https://openalex.org/W2798507000","https://openalex.org/W2914871104"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W4391584122","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W1500594134","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W4321062229"],"abstract_inverted_index":{"The":[0],"electromagnetic":[1,47,60,67,116,145,151,165,173],"Trojan":[2,48,61,152,174],"attack":[3],"can":[4,162],"break":[5],"through":[6],"the":[7,13,19,25,39,57,66,78,100,103,115,130,139,144,150,168,178],"physical":[8],"isolation":[9],"to":[10,34,142,158],"attack,":[11],"and":[12,28,76,92,114,127,176],"leaked":[14],"channel":[15],"does":[16],"not":[17],"use":[18],"system":[20],"network":[21],"resources,":[22],"which":[23,55],"makes":[24,56],"traditional":[26],"firewall":[27],"other":[29],"intrusion":[30],"detection":[31,49],"devices":[32],"unable":[33],"effectively":[35,163],"prevent.":[36],"Based":[37],"on":[38,52],"existing":[40],"research":[41],"results,":[42],"this":[43],"paper":[44],"proposes":[45],"an":[46],"method":[50],"based":[51],"deep":[53],"learning,":[54],"work":[58],"of":[59,95,170,180],"analysis":[62],"more":[63],"intelligent.":[64],"First,":[65],"wave":[68],"signal":[69,79,101,132],"is":[70,80,106,135],"captured":[71],"using":[72,138],"software-defined":[73],"radio":[74],"technology,":[75],"then":[77],"initially":[81],"filtered":[82],"in":[83,97,102,110,172],"combination":[84],"with":[85],"a":[86,89,93,111],"white":[87],"list,":[88],"demodulated":[90],"signal,":[91],"rate":[94],"change":[96],"intensity.":[98],"Secondly,":[99],"frequency":[104],"domain":[105],"divided":[107],"into":[108],"blocks":[109],"time-window":[112],"mode,":[113],"signals":[117],"are":[118],"represented":[119],"by":[120,155],"features":[121],"such":[122],"as":[123],"time,":[124],"information":[125],"amount,":[126],"energy.":[128],"Finally,":[129],"serialized":[131],"feature":[133],"vector":[134],"further":[136],"extracted":[137],"LSTM":[140],"algorithm":[141],"identify":[143],"Trojan.":[146],"This":[147],"experiment":[148],"uses":[149],"data":[153],"published":[154],"Gurion":[156],"University":[157],"test.":[159],"And":[160],"it":[161],"defend":[164],"Trojans,":[166],"improve":[167],"participation":[169],"computers":[171],"detection,":[175],"reduce":[177],"cost":[179],"manual":[181],"testing.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
