{"id":"https://openalex.org/W7125524306","doi":"https://doi.org/10.1186/s42400-025-00542-7","title":"Robust hardware Trojan detection leveraging dual-domain features and stacked ensemble learning","display_name":"Robust hardware Trojan detection leveraging dual-domain features and stacked ensemble learning","publication_year":2026,"publication_date":"2026-01-23","ids":{"openalex":"https://openalex.org/W7125524306","doi":"https://doi.org/10.1186/s42400-025-00542-7"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00542-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00542-7","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00542-7.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00542-7.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093396008","display_name":"Sefatun-Noor Puspa","orcid":null},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sefatun-Noor Puspa","raw_affiliation_strings":["Department of Civil Engineering, Clemson University, Clemson, SC, 29634, USA"],"affiliations":[{"raw_affiliation_string":"Department of Civil Engineering, Clemson University, Clemson, SC, 29634, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093400150","display_name":"Abyad Enan","orcid":"https://orcid.org/0000-0002-1599-5472"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abyad Enan","raw_affiliation_strings":["Department of Civil Engineering, Clemson University, Clemson, SC, 29634, USA"],"affiliations":[{"raw_affiliation_string":"Department of Civil Engineering, Clemson University, Clemson, SC, 29634, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014793222","display_name":"Reek Majumder","orcid":"https://orcid.org/0000-0002-4659-7506"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Reek Majumder","raw_affiliation_strings":["Department of Civil Engineering, Clemson University, Clemson, SC, 29634, USA"],"affiliations":[{"raw_affiliation_string":"Department of Civil Engineering, Clemson University, Clemson, SC, 29634, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123630741","display_name":"M Sabbir Salek","orcid":null},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M Sabbir Salek","raw_affiliation_strings":["Department of Civil Engineering, Clemson University, Clemson, SC, 29634, USA"],"affiliations":[{"raw_affiliation_string":"Department of Civil Engineering, Clemson University, Clemson, SC, 29634, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018848498","display_name":"Gurcan Comert","orcid":"https://orcid.org/0000-0002-2373-5013"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gurcan Comert","raw_affiliation_strings":["Computational Data Science and Engineering Department, North Carolina A&T State University, Greensboro, NC, 27411, USA"],"affiliations":[{"raw_affiliation_string":"Computational Data Science and Engineering Department, North Carolina A&T State University, Greensboro, NC, 27411, USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023953462","display_name":"Mashrur Chowdhury","orcid":null},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mashrur Chowdhury","raw_affiliation_strings":["Department of Civil Engineering, Clemson University, Clemson, SC, 29634, USA"],"affiliations":[{"raw_affiliation_string":"Department of Civil Engineering, Clemson University, Clemson, SC, 29634, USA","institution_ids":["https://openalex.org/I8078737"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5093396008"],"corresponding_institution_ids":["https://openalex.org/I8078737"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11573546,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.0015999999595806003,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.0012000000569969416,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.7019000053405762},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.5450000166893005},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.5198000073432922},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5080000162124634},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.48350000381469727},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.478300005197525},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4595000147819519},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4584999978542328},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4449999928474426}],"concepts":[{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.7019000053405762},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6348000168800354},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.5450000166893005},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5421000123023987},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.5198000073432922},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5080000162124634},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.48350000381469727},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.478300005197525},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4595000147819519},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4584999978542328},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45320001244544983},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4449999928474426},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.430400013923645},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.40639999508857727},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.40049999952316284},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.388700008392334},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.36079999804496765},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.3490999937057495},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.3434000015258789},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.33640000224113464},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.33059999346733093},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.3294999897480011},{"id":"https://openalex.org/C207201462","wikidata":"https://www.wikidata.org/wiki/Q182505","display_name":"Bayes' theorem","level":3,"score":0.32710000872612},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3215999901294708},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.3095000088214874},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.27459999918937683},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.2669999897480011},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.26669999957084656},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.25769999623298645}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00542-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00542-7","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00542-7.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:841630e2530546a6a6348430316b2eb1","is_oa":true,"landing_page_url":"https://doaj.org/article/841630e2530546a6a6348430316b2eb1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-21 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00542-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00542-7","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00542-7.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2773737606","display_name":null,"funder_award_id":"2131080","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8445643807","display_name":"How Do Fluctuations in Summer Temperature Affect Monsoonal Events?","funder_award_id":"2026311","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306108","display_name":"U.S. Department of Transportation","ror":"https://ror.org/02xfw2e90"},{"id":"https://openalex.org/F4320309106","display_name":"Clemson University","ror":"https://ror.org/037s24f05"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125524306.pdf","grobid_xml":"https://content.openalex.org/works/W7125524306.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W1500140210","https://openalex.org/W1565839003","https://openalex.org/W2011712479","https://openalex.org/W2061171222","https://openalex.org/W2064675550","https://openalex.org/W2109894721","https://openalex.org/W2145286644","https://openalex.org/W2150928734","https://openalex.org/W2281118432","https://openalex.org/W2756703387","https://openalex.org/W2768509443","https://openalex.org/W2905755717","https://openalex.org/W2911617582","https://openalex.org/W2911964244","https://openalex.org/W2914488306","https://openalex.org/W2963222704","https://openalex.org/W2995289804","https://openalex.org/W3009207988","https://openalex.org/W3014595021","https://openalex.org/W3028433083","https://openalex.org/W3034472990","https://openalex.org/W3104393478","https://openalex.org/W3123310525","https://openalex.org/W3135635993","https://openalex.org/W3157323621","https://openalex.org/W4313529160","https://openalex.org/W4313549216","https://openalex.org/W4366259815","https://openalex.org/W4377971464","https://openalex.org/W4388117362","https://openalex.org/W4389230909","https://openalex.org/W4392152684","https://openalex.org/W4392153186","https://openalex.org/W4393010539","https://openalex.org/W4400005995","https://openalex.org/W4401991297","https://openalex.org/W4402767923","https://openalex.org/W4405220877","https://openalex.org/W4405360393","https://openalex.org/W4406684473","https://openalex.org/W4407948980","https://openalex.org/W4408863105"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Cyber-physical":[1],"systems":[2],"rely":[3,279],"on":[4,229,280],"sensors,":[5],"communication,":[6],"and":[7,55,74,103,112,164,178],"computing,":[8],"all":[9,250],"powered":[10],"by":[11],"integrated":[12],"circuits":[13,197],"(ICs).":[14],"These":[15],"ICs":[16],"are":[17,33,40,87,114],"vulnerable":[18],"to":[19,79,90,194],"malicious":[20,34],"hardware":[21,24,85],"attacks,":[22],"with":[23,127],"Trojans":[25,32,86],"being":[26],"one":[27],"of":[28,130,213,270,296],"the":[29,37,104,134,210,214,230,241,245,263],"stealthiest":[30],"threats.":[31],"implants":[35],"in":[36,219],"circuitry,":[38],"which":[39,236],"often":[41,96],"inserted":[42],"during":[43],"design":[44],"or":[45,60],"fabrication":[46],"stages.":[47],"This":[48],"stealthy":[49],"addition":[50],"remains":[51],"dormant":[52,98],"until":[53],"triggered":[54],"might":[56],"cause":[57],"functional":[58,72],"disruptions":[59],"sensitive":[61],"information":[62],"leakage":[63],"once":[64],"triggered.":[65],"Traditional":[66],"IC":[67,284],"validation":[68],"methods,":[69],"such":[70,153,168,299],"as":[71,154,169,190,300],"testing":[73],"logic":[75],"analysis,":[76],"usually":[77],"fail":[78],"capture":[80],"these":[81,188],"subtle":[82],"anomalies":[83,291],"because":[84],"intentionally":[88],"designed":[89],"mimic":[91],"normal":[92],"circuit":[93],"behavior.":[94],"They":[95],"remain":[97],"under":[99,262],"standard":[100,233],"test":[101],"vectors,":[102],"changes":[105],"they":[106],"bring":[107],"into":[108],"power":[109,131,200],"consumption,":[110],"timing,":[111],"area":[113,261],"minimal.":[115],"We":[116,202],"present":[117],"a":[118,204,259,281],"dual-domain":[119],"feature":[120],"extraction":[121],"strategy":[122],"that":[123,147,208,244],"combines":[124],"time-domain":[125],"features":[126],"frequency-domain":[128],"characteristics":[129,295],"traces.":[132],"For":[133],"detection,":[135],"we":[136,186],"created":[137],"an":[138],"artificial":[139],"intelligence":[140],"(AI)":[141],"based":[142],"robust":[143],"Trojan":[144,239],"detection":[145,227,256],"framework":[146],"integrates":[148,209],"traditional":[149],"machine":[150],"learning":[151,166],"models,":[152,167],"random":[155],"forest":[156],"(RF),":[157],"gradient":[158],"boosting":[159],"(GB),":[160],"na\u00efve":[161],"bayes":[162],"(NB),":[163],"deep":[165,170],"neural":[171,180],"network":[172,181],"(DNN),":[173],"long":[174],"short-term":[175],"memory":[176],"(LSTM),":[177],"graph":[179],"(GNN).":[182],"In":[183],"this":[184,220],"study,":[185],"consider":[187],"models":[189,193,217],"baseline":[191,216,252,286],"AI":[192],"detect":[195],"Trojan-infected":[196],"via":[198],"side-channel":[199,301],"analysis.":[201],"employed":[203],"stacked":[205],"ensemble":[206,246],"classifier":[207],"distinct":[211],"strengths":[212],"six":[215,251],"used":[218],"study.":[221],"After":[222],"evaluating":[223],"our":[224],"stacking":[225],"ensemble-based":[226,255],"method":[228,247,257],"advanced":[231],"encryption":[232],"(AES)-Trojan":[234],"benchmark,":[235],"covers":[237],"diverse":[238],"types,":[240],"results":[242],"demonstrate":[243],"consistently":[248],"outperformed":[249],"models.":[253],"The":[254],"achieved":[258],"macro-averaged":[260],"receiver":[264],"operating":[265],"characteristic":[266],"(ROC)":[267],"curve":[268],"(AUC)":[269],"0.987,":[271],"while":[272],"remaining":[273],"golden-chip-free,":[274],"meaning":[275],"it":[276,289],"does":[277],"not":[278],"trusted":[282],"reference":[283],"for":[285],"comparison.":[287],"Instead":[288],"detects":[290],"directly":[292],"from":[293],"observable":[294],"untrusted":[297],"chips,":[298],"emissions.":[302]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2026-01-24T00:00:00"}
