Graph Similarity and its Applications to Hardware Security | IEEE Journals & Magazine | IEEE Xplore