Hardware Trojan Detection Based on Ordered Mixed Feature GEP Article Swipe
Huan Zhang
,
Jiliu Zhou
,
Dongrui Gao
,
Xinguo Wang
,
Zhefan Chen
,
Hongyu Wang
·
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1155/2021/6682674
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1155/2021/6682674
In the hardware Trojan detection field, destructive reverse engineering and bypass detection are both important methods. This paper proposed an evolutionary algorithm called Ordered Mixed Feature GEP (OMF-GEP), trying to restore the circuit structure only by using the bypass information. This algorithm was developed from the basic GEP through three sets of experiments at different stages. To solve the problem, this paper transformed the GEP by introducing mixed features, ordered genes, and superchromosomes. And the experiment results show that the algorithm is effective.
Related Topics
Concepts
Metadata
- Type
- article
- Language
- en
- Landing Page
- http://doi.org/10.1155/2021/6682674
- https://downloads.hindawi.com/journals/scn/2021/6682674.pdf
- OA Status
- hybrid
- Cited By
- 1
- References
- 23
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3137274258
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3137274258Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1155/2021/6682674Digital Object Identifier
- Title
-
Hardware Trojan Detection Based on Ordered Mixed Feature GEPWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-03-18Full publication date if available
- Authors
-
Huan Zhang, Jiliu Zhou, Dongrui Gao, Xinguo Wang, Zhefan Chen, Hongyu WangList of authors in order
- Landing page
-
https://doi.org/10.1155/2021/6682674Publisher landing page
- PDF URL
-
https://downloads.hindawi.com/journals/scn/2021/6682674.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://downloads.hindawi.com/journals/scn/2021/6682674.pdfDirect OA link when available
- Concepts
-
Trojan, Computer science, Feature (linguistics), Field (mathematics), Algorithm, Data mining, Artificial intelligence, Pattern recognition (psychology), Computer security, Mathematics, Pure mathematics, Linguistics, PhilosophyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2022: 1Per-year citation counts (last 5 years)
- References (count)
-
23Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3137274258 |
|---|---|
| doi | https://doi.org/10.1155/2021/6682674 |
| ids.doi | https://doi.org/10.1155/2021/6682674 |
| ids.mag | 3137274258 |
| ids.openalex | https://openalex.org/W3137274258 |
| fwci | 0.25564883 |
| type | article |
| title | Hardware Trojan Detection Based on Ordered Mixed Feature GEP |
| awards[0].id | https://openalex.org/G5500760233 |
| awards[0].funder_id | https://openalex.org/F4320311826 |
| awards[0].display_name | |
| awards[0].funder_award_id | 2019YFG0196 |
| awards[0].funder_display_name | Chengdu University of Information Technology |
| awards[1].id | https://openalex.org/G4487606954 |
| awards[1].funder_id | https://openalex.org/F4320323292 |
| awards[1].display_name | |
| awards[1].funder_award_id | KYTZ201720 |
| awards[1].funder_display_name | University of Electronic Science and Technology of China |
| awards[2].id | https://openalex.org/G8392056980 |
| awards[2].funder_id | https://openalex.org/F4320323292 |
| awards[2].display_name | |
| awards[2].funder_award_id | 2019YFG0196 |
| awards[2].funder_display_name | University of Electronic Science and Technology of China |
| awards[3].id | https://openalex.org/G5267551018 |
| awards[3].funder_id | https://openalex.org/F4320311826 |
| awards[3].display_name | |
| awards[3].funder_award_id | SYFD061902K |
| awards[3].funder_display_name | Chengdu University of Information Technology |
| awards[4].id | https://openalex.org/G7473947453 |
| awards[4].funder_id | https://openalex.org/F4320311826 |
| awards[4].display_name | |
| awards[4].funder_award_id | KYTZ201720 |
| awards[4].funder_display_name | Chengdu University of Information Technology |
| awards[5].id | https://openalex.org/G4549197693 |
| awards[5].funder_id | https://openalex.org/F4320323292 |
| awards[5].display_name | |
| awards[5].funder_award_id | SYFD061902K |
| awards[5].funder_display_name | University of Electronic Science and Technology of China |
| biblio.issue | |
| biblio.volume | 2021 |
| biblio.last_page | 9 |
| biblio.first_page | 1 |
| topics[0].id | https://openalex.org/T12122 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9994999766349792 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1708 |
| topics[0].subfield.display_name | Hardware and Architecture |
| topics[0].display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| topics[1].id | https://openalex.org/T14117 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9883999824523926 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2208 |
| topics[1].subfield.display_name | Electrical and Electronic Engineering |
| topics[1].display_name | Integrated Circuits and Semiconductor Failure Analysis |
| topics[2].id | https://openalex.org/T12859 |
| topics[2].field.id | https://openalex.org/fields/13 |
| topics[2].field.display_name | Biochemistry, Genetics and Molecular Biology |
| topics[2].score | 0.9825999736785889 |
| topics[2].domain.id | https://openalex.org/domains/1 |
| topics[2].domain.display_name | Life Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1304 |
| topics[2].subfield.display_name | Biophysics |
| topics[2].display_name | Cell Image Analysis Techniques |
| funders[0].id | https://openalex.org/F4320311826 |
| funders[0].ror | https://ror.org/01yxwrh59 |
| funders[0].display_name | Chengdu University of Information Technology |
| funders[1].id | https://openalex.org/F4320323292 |
| funders[1].ror | https://ror.org/04qr3zq92 |
| funders[1].display_name | University of Electronic Science and Technology of China |
| is_xpac | False |
| apc_list.value | 2100 |
| apc_list.currency | USD |
| apc_list.value_usd | 2100 |
| apc_paid.value | 2100 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 2100 |
| concepts[0].id | https://openalex.org/C174333608 |
| concepts[0].level | 2 |
| concepts[0].score | 0.872443675994873 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q19635 |
| concepts[0].display_name | Trojan |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.8384990692138672 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C2776401178 |
| concepts[2].level | 2 |
| concepts[2].score | 0.693343997001648 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q12050496 |
| concepts[2].display_name | Feature (linguistics) |
| concepts[3].id | https://openalex.org/C9652623 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5216472744941711 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q190109 |
| concepts[3].display_name | Field (mathematics) |
| concepts[4].id | https://openalex.org/C11413529 |
| concepts[4].level | 1 |
| concepts[4].score | 0.3730807304382324 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[4].display_name | Algorithm |
| concepts[5].id | https://openalex.org/C124101348 |
| concepts[5].level | 1 |
| concepts[5].score | 0.349658727645874 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[5].display_name | Data mining |
| concepts[6].id | https://openalex.org/C154945302 |
| concepts[6].level | 1 |
| concepts[6].score | 0.34880173206329346 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[6].display_name | Artificial intelligence |
| concepts[7].id | https://openalex.org/C153180895 |
| concepts[7].level | 2 |
| concepts[7].score | 0.33206331729888916 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7148389 |
| concepts[7].display_name | Pattern recognition (psychology) |
| concepts[8].id | https://openalex.org/C38652104 |
| concepts[8].level | 1 |
| concepts[8].score | 0.10465478897094727 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[8].display_name | Computer security |
| concepts[9].id | https://openalex.org/C33923547 |
| concepts[9].level | 0 |
| concepts[9].score | 0.08954092860221863 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[9].display_name | Mathematics |
| concepts[10].id | https://openalex.org/C202444582 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q837863 |
| concepts[10].display_name | Pure mathematics |
| concepts[11].id | https://openalex.org/C41895202 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q8162 |
| concepts[11].display_name | Linguistics |
| concepts[12].id | https://openalex.org/C138885662 |
| concepts[12].level | 0 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q5891 |
| concepts[12].display_name | Philosophy |
| keywords[0].id | https://openalex.org/keywords/trojan |
| keywords[0].score | 0.872443675994873 |
| keywords[0].display_name | Trojan |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.8384990692138672 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/feature |
| keywords[2].score | 0.693343997001648 |
| keywords[2].display_name | Feature (linguistics) |
| keywords[3].id | https://openalex.org/keywords/field |
| keywords[3].score | 0.5216472744941711 |
| keywords[3].display_name | Field (mathematics) |
| keywords[4].id | https://openalex.org/keywords/algorithm |
| keywords[4].score | 0.3730807304382324 |
| keywords[4].display_name | Algorithm |
| keywords[5].id | https://openalex.org/keywords/data-mining |
| keywords[5].score | 0.349658727645874 |
| keywords[5].display_name | Data mining |
| keywords[6].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[6].score | 0.34880173206329346 |
| keywords[6].display_name | Artificial intelligence |
| keywords[7].id | https://openalex.org/keywords/pattern-recognition |
| keywords[7].score | 0.33206331729888916 |
| keywords[7].display_name | Pattern recognition (psychology) |
| keywords[8].id | https://openalex.org/keywords/computer-security |
| keywords[8].score | 0.10465478897094727 |
| keywords[8].display_name | Computer security |
| keywords[9].id | https://openalex.org/keywords/mathematics |
| keywords[9].score | 0.08954092860221863 |
| keywords[9].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.1155/2021/6682674 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S120683614 |
| locations[0].source.issn | 1939-0114, 1939-0122 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1939-0114 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Security and Communication Networks |
| locations[0].source.host_organization | https://openalex.org/P4310319869 |
| locations[0].source.host_organization_name | Hindawi Publishing Corporation |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319869 |
| locations[0].source.host_organization_lineage_names | Hindawi Publishing Corporation |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://downloads.hindawi.com/journals/scn/2021/6682674.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Security and Communication Networks |
| locations[0].landing_page_url | http://doi.org/10.1155/2021/6682674 |
| locations[1].id | pmh:oai:doaj.org/article:a3cefb36eab441c3b4a6ca6875b5fea3 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Security and Communication Networks, Vol 2021 (2021) |
| locations[1].landing_page_url | https://doaj.org/article/a3cefb36eab441c3b4a6ca6875b5fea3 |
| locations[2].id | pmh:oai:hindawi.com:10.1155/2021/6682674 |
| locations[2].is_oa | True |
| locations[2].source.id | https://openalex.org/S4306400340 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | Hindawi Journal of Chemistry (Hindawi) |
| locations[2].source.host_organization | https://openalex.org/I4210126990 |
| locations[2].source.host_organization_name | Hindawi (United Kingdom) |
| locations[2].source.host_organization_lineage | https://openalex.org/I4210126990 |
| locations[2].license | cc-by |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | Research Article |
| locations[2].license_id | https://openalex.org/licenses/cc-by |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | |
| locations[2].landing_page_url | https://doi.org/10.1155/2021/6682674 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5101437998 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-4941-3167 |
| authorships[0].author.display_name | Huan Zhang |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I24201400 |
| authorships[0].affiliations[0].raw_affiliation_string | School of Computer Science, Chengdu University of Information Technology, Chengdu 610225, China |
| authorships[0].affiliations[1].institution_ids | https://openalex.org/I24185976 |
| authorships[0].affiliations[1].raw_affiliation_string | College of Computer Science, Sichuan University, Chengdu 610065, China |
| authorships[0].institutions[0].id | https://openalex.org/I24201400 |
| authorships[0].institutions[0].ror | https://ror.org/01yxwrh59 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I24201400 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Chengdu University of Information Technology |
| authorships[0].institutions[1].id | https://openalex.org/I24185976 |
| authorships[0].institutions[1].ror | https://ror.org/011ashp19 |
| authorships[0].institutions[1].type | education |
| authorships[0].institutions[1].lineage | https://openalex.org/I24185976 |
| authorships[0].institutions[1].country_code | CN |
| authorships[0].institutions[1].display_name | Sichuan University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Huan Zhang |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | College of Computer Science, Sichuan University, Chengdu 610065, China, School of Computer Science, Chengdu University of Information Technology, Chengdu 610225, China |
| authorships[1].author.id | https://openalex.org/A5102009027 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-6864-9509 |
| authorships[1].author.display_name | Jiliu Zhou |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I24185976 |
| authorships[1].affiliations[0].raw_affiliation_string | College of Computer Science, Sichuan University, Chengdu 610065, China |
| authorships[1].institutions[0].id | https://openalex.org/I24185976 |
| authorships[1].institutions[0].ror | https://ror.org/011ashp19 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I24185976 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Sichuan University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Jiliu Zhou |
| authorships[1].is_corresponding | True |
| authorships[1].raw_affiliation_strings | College of Computer Science, Sichuan University, Chengdu 610065, China |
| authorships[2].author.id | https://openalex.org/A5037463477 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-2023-0765 |
| authorships[2].author.display_name | Dongrui Gao |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I150229711 |
| authorships[2].affiliations[0].raw_affiliation_string | Center for Information in Biomedicine, School of Life Sciences and Technology, University of Electronic Science and Technology of China, Chengdu 611731, China |
| authorships[2].affiliations[1].institution_ids | https://openalex.org/I24201400 |
| authorships[2].affiliations[1].raw_affiliation_string | School of Computer Science, Chengdu University of Information Technology, Chengdu 610225, China |
| authorships[2].institutions[0].id | https://openalex.org/I24201400 |
| authorships[2].institutions[0].ror | https://ror.org/01yxwrh59 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I24201400 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Chengdu University of Information Technology |
| authorships[2].institutions[1].id | https://openalex.org/I150229711 |
| authorships[2].institutions[1].ror | https://ror.org/04qr3zq92 |
| authorships[2].institutions[1].type | education |
| authorships[2].institutions[1].lineage | https://openalex.org/I150229711 |
| authorships[2].institutions[1].country_code | CN |
| authorships[2].institutions[1].display_name | University of Electronic Science and Technology of China |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Dongrui Gao |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Center for Information in Biomedicine, School of Life Sciences and Technology, University of Electronic Science and Technology of China, Chengdu 611731, China, School of Computer Science, Chengdu University of Information Technology, Chengdu 610225, China |
| authorships[3].author.id | https://openalex.org/A5047967535 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-2579-6805 |
| authorships[3].author.display_name | Xinguo Wang |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I24201400 |
| authorships[3].affiliations[0].raw_affiliation_string | School of Computer Science, Chengdu University of Information Technology, Chengdu 610225, China |
| authorships[3].institutions[0].id | https://openalex.org/I24201400 |
| authorships[3].institutions[0].ror | https://ror.org/01yxwrh59 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I24201400 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | Chengdu University of Information Technology |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Xinguo Wang |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | School of Computer Science, Chengdu University of Information Technology, Chengdu 610225, China |
| authorships[4].author.id | https://openalex.org/A5011632368 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | Zhefan Chen |
| authorships[4].countries | CA |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I18014758 |
| authorships[4].affiliations[0].raw_affiliation_string | Faculty of Science, Simon Fraser University, Burnaby V5A 1S6, Canada |
| authorships[4].institutions[0].id | https://openalex.org/I18014758 |
| authorships[4].institutions[0].ror | https://ror.org/0213rcc28 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I18014758 |
| authorships[4].institutions[0].country_code | CA |
| authorships[4].institutions[0].display_name | Simon Fraser University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Zhefan Chen |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Faculty of Science, Simon Fraser University, Burnaby V5A 1S6, Canada |
| authorships[5].author.id | https://openalex.org/A5100651173 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-3187-1939 |
| authorships[5].author.display_name | Hongyu Wang |
| authorships[5].countries | CN |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I24201400 |
| authorships[5].affiliations[0].raw_affiliation_string | School of Computer Science, Chengdu University of Information Technology, Chengdu 610225, China |
| authorships[5].institutions[0].id | https://openalex.org/I24201400 |
| authorships[5].institutions[0].ror | https://ror.org/01yxwrh59 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I24201400 |
| authorships[5].institutions[0].country_code | CN |
| authorships[5].institutions[0].display_name | Chengdu University of Information Technology |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Hongyu Wang |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | School of Computer Science, Chengdu University of Information Technology, Chengdu 610225, China |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://downloads.hindawi.com/journals/scn/2021/6682674.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Hardware Trojan Detection Based on Ordered Mixed Feature GEP |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T12122 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9994999766349792 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1708 |
| primary_topic.subfield.display_name | Hardware and Architecture |
| primary_topic.display_name | Physical Unclonable Functions (PUFs) and Hardware Security |
| related_works | https://openalex.org/W4253721122, https://openalex.org/W1671033612, https://openalex.org/W4389527383, https://openalex.org/W4206524843, https://openalex.org/W2139923244, https://openalex.org/W2237899707, https://openalex.org/W576137284, https://openalex.org/W2116135171, https://openalex.org/W2057970756, https://openalex.org/W3159661535 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2022 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 3 |
| best_oa_location.id | doi:10.1155/2021/6682674 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S120683614 |
| best_oa_location.source.issn | 1939-0114, 1939-0122 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1939-0114 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Security and Communication Networks |
| best_oa_location.source.host_organization | https://openalex.org/P4310319869 |
| best_oa_location.source.host_organization_name | Hindawi Publishing Corporation |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319869 |
| best_oa_location.source.host_organization_lineage_names | Hindawi Publishing Corporation |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://downloads.hindawi.com/journals/scn/2021/6682674.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Security and Communication Networks |
| best_oa_location.landing_page_url | http://doi.org/10.1155/2021/6682674 |
| primary_location.id | doi:10.1155/2021/6682674 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S120683614 |
| primary_location.source.issn | 1939-0114, 1939-0122 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1939-0114 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Security and Communication Networks |
| primary_location.source.host_organization | https://openalex.org/P4310319869 |
| primary_location.source.host_organization_name | Hindawi Publishing Corporation |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319869 |
| primary_location.source.host_organization_lineage_names | Hindawi Publishing Corporation |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://downloads.hindawi.com/journals/scn/2021/6682674.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Security and Communication Networks |
| primary_location.landing_page_url | http://doi.org/10.1155/2021/6682674 |
| publication_date | 2021-03-18 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W1960590614, https://openalex.org/W2018722509, https://openalex.org/W2221643708, https://openalex.org/W2145937629, https://openalex.org/W2061007021, https://openalex.org/W2148559224, https://openalex.org/W2065858973, https://openalex.org/W2093137120, https://openalex.org/W2739579953, https://openalex.org/W2995861599, https://openalex.org/W2961451835, https://openalex.org/W3129077988, https://openalex.org/W2972543319, https://openalex.org/W3033466701, https://openalex.org/W1501347617, https://openalex.org/W1734028302, https://openalex.org/W1699410824, https://openalex.org/W2165326399, https://openalex.org/W2158880453, https://openalex.org/W126921898, https://openalex.org/W6635338587, https://openalex.org/W1514940056, https://openalex.org/W1592322660 |
| referenced_works_count | 23 |
| abstract_inverted_index.In | 0 |
| abstract_inverted_index.To | 56 |
| abstract_inverted_index.an | 19 |
| abstract_inverted_index.at | 53 |
| abstract_inverted_index.by | 35, 65 |
| abstract_inverted_index.is | 81 |
| abstract_inverted_index.of | 51 |
| abstract_inverted_index.to | 29 |
| abstract_inverted_index.And | 73 |
| abstract_inverted_index.GEP | 26, 47, 64 |
| abstract_inverted_index.and | 9, 71 |
| abstract_inverted_index.are | 12 |
| abstract_inverted_index.the | 1, 31, 37, 45, 58, 63, 74, 79 |
| abstract_inverted_index.was | 42 |
| abstract_inverted_index.This | 16, 40 |
| abstract_inverted_index.both | 13 |
| abstract_inverted_index.from | 44 |
| abstract_inverted_index.only | 34 |
| abstract_inverted_index.sets | 50 |
| abstract_inverted_index.show | 77 |
| abstract_inverted_index.that | 78 |
| abstract_inverted_index.this | 60 |
| abstract_inverted_index.Mixed | 24 |
| abstract_inverted_index.basic | 46 |
| abstract_inverted_index.mixed | 67 |
| abstract_inverted_index.paper | 17, 61 |
| abstract_inverted_index.solve | 57 |
| abstract_inverted_index.three | 49 |
| abstract_inverted_index.using | 36 |
| abstract_inverted_index.Trojan | 3 |
| abstract_inverted_index.bypass | 10, 38 |
| abstract_inverted_index.called | 22 |
| abstract_inverted_index.field, | 5 |
| abstract_inverted_index.genes, | 70 |
| abstract_inverted_index.trying | 28 |
| abstract_inverted_index.Feature | 25 |
| abstract_inverted_index.Ordered | 23 |
| abstract_inverted_index.circuit | 32 |
| abstract_inverted_index.ordered | 69 |
| abstract_inverted_index.restore | 30 |
| abstract_inverted_index.results | 76 |
| abstract_inverted_index.reverse | 7 |
| abstract_inverted_index.stages. | 55 |
| abstract_inverted_index.through | 48 |
| abstract_inverted_index.hardware | 2 |
| abstract_inverted_index.methods. | 15 |
| abstract_inverted_index.problem, | 59 |
| abstract_inverted_index.proposed | 18 |
| abstract_inverted_index.algorithm | 21, 41, 80 |
| abstract_inverted_index.detection | 4, 11 |
| abstract_inverted_index.developed | 43 |
| abstract_inverted_index.different | 54 |
| abstract_inverted_index.features, | 68 |
| abstract_inverted_index.important | 14 |
| abstract_inverted_index.structure | 33 |
| abstract_inverted_index.(OMF-GEP), | 27 |
| abstract_inverted_index.effective. | 82 |
| abstract_inverted_index.experiment | 75 |
| abstract_inverted_index.destructive | 6 |
| abstract_inverted_index.engineering | 8 |
| abstract_inverted_index.experiments | 52 |
| abstract_inverted_index.introducing | 66 |
| abstract_inverted_index.transformed | 62 |
| abstract_inverted_index.evolutionary | 20 |
| abstract_inverted_index.information. | 39 |
| abstract_inverted_index.superchromosomes. | 72 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| corresponding_author_ids | https://openalex.org/A5102009027 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 6 |
| corresponding_institution_ids | https://openalex.org/I24185976 |
| citation_normalized_percentile.value | 0.46311728 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |