{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:56:05Z","timestamp":1740102965464,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2155189"],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,12]]},"DOI":"10.1145\/3649476.3658705","type":"proceedings-article","created":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T16:29:41Z","timestamp":1718036981000},"page":"198-203","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["On Hardware Trojan Detection using Oracle-Guided Circuit Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8386-352X","authenticated-orcid":false,"given":"Rajesh Kumar","family":"Datta","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, University of Texas at Dallas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3196-4326","authenticated-orcid":false,"given":"Guangwei","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4727-8058","authenticated-orcid":false,"given":"Dipali","family":"Jain","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Texas at Dallas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9952-4597","authenticated-orcid":false,"given":"Kaveh","family":"Shamsi","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Texas at Dallas, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. dynqbf.https:\/\/github.com\/TU-Wien-DBAI\/dynqbf."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. neos.http:\/\/www.bitbucket.com\/kavehshm\/neos."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-017-5670-0"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18275-4_7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2018.43"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23218"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2018.8624866"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3545000","article-title":"Hardware Trojan Detection using Transition Probability with Minimal Test Vectors","volume":"22","author":"Mondal Anindan","year":"2022","unstructured":"Anindan Mondal, Shubrojyoti Karmakar, Mahabub\u00a0Hasan Mahalat, Suchismita Roy, Bibhash Sen, and Anupam Chattopadhyay. 2022. Hardware Trojan Detection using Transition Probability with Minimal Test Vectors. ACM Transactions on Embedded Computing Systems 22, 1 (2022), 1\u201321.","journal-title":"ACM Transactions on Embedded Computing Systems"},{"key":"e_1_3_2_1_9_1","volume-title":"A novel technique for improving hardware trojan detection and reducing trojan activation time","author":"Salmani Hassan","year":"2011","unstructured":"Hassan Salmani, Mohammad Tehranipoor, and Jim Plusquellic. 2011. A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE transactions on very large scale integration (VLSI) systems 20, 1 (2011), 112\u2013125."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643495"},{"key":"e_1_3_2_1_11_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 534\u2013539","author":"Shamsi Kaveh","year":"2019","unstructured":"Kaveh Shamsi, Meng Li, David\u00a0Z Pan, and Yier Jin. 2019. KC2: Key-Condition Crunching for Fast Sequential Circuit Deobfuscation. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 534\u2013539."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2975585"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"}],"event":{"name":"GLSVLSI '24: Great Lakes Symposium on VLSI 2024","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"Clearwater FL USA","acronym":"GLSVLSI '24"},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649476.3658705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T10:49:26Z","timestamp":1721990966000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649476.3658705"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,12]]},"references-count":15,"alternative-id":["10.1145\/3649476.3658705","10.1145\/3649476"],"URL":"https:\/\/doi.org\/10.1145\/3649476.3658705","relation":{},"subject":[],"published":{"date-parts":[[2024,6,12]]},"assertion":[{"value":"2024-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}