{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:49:17Z","timestamp":1776401357394,"version":"3.51.2"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031556722","type":"print"},{"value":"9783031556739","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-55673-9_10","type":"book-chapter","created":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T23:02:15Z","timestamp":1710198135000},"page":"134-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["NEUROSEC: FPGA-Based Neuromorphic Audio Security"],"prefix":"10.1007","author":[{"given":"Murat","family":"Isik","sequence":"first","affiliation":[]},{"given":"Hiruna","family":"Vishwamith","sequence":"additional","affiliation":[]},{"given":"Yusuf","family":"Sur","sequence":"additional","affiliation":[]},{"given":"Kayode","family":"Inadagbo","sequence":"additional","affiliation":[]},{"given":"I. Can","family":"Dikmen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,10]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Bu, T., Ding, J., Hao, Z., Yu, Z.: Rate gradient approximation attack threats deep spiking neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7896\u20137906 (2023)","DOI":"10.1109\/CVPR52729.2023.00763"},{"issue":"18","key":"10_CR2","doi-asserted-by":"publisher","first-page":"8450","DOI":"10.3390\/app11188450","volume":"11","author":"X Chen","year":"2021","unstructured":"Chen, X., Li, S., Huang, H.: Adversarial attack and defense on deep neural network-based voice processing systems: an overview. Appl. Sci. 11(18), 8450 (2021)","journal-title":"Appl. Sci."},{"key":"10_CR3","unstructured":"Gal\u00e1n, D.G.: Neuromorphic auditory computing: towards a digital, event-based implementation of the hearing sense for robotics. Ph.D. thesis, Universidad de Sevilla (2022)"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"84398","DOI":"10.1109\/ACCESS.2022.3197907","volume":"10","author":"P Giannakopoulos","year":"2022","unstructured":"Giannakopoulos, P., Pikrakis, A., Cotronis, Y.: Improving post-processing of audio event detectors using reinforcement learning. IEEE Access 10, 84398\u201384404 (2022)","journal-title":"IEEE Access"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Gongye, C., Luo, Y., Xu, X., Fei, Y.: HammerDodger: a lightweight defense framework against RowHammer attack on DNNs. In: 2023 60th ACM\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2023)","DOI":"10.1109\/DAC56929.2023.10247671"},{"key":"10_CR6","unstructured":"Huynh, P.K., Varshika, M.L., Paul, A., Isik, M., Balaji, A., Das, A.: Implementing spiking neural networks on neuromorphic architectures: a review. arXiv preprint arXiv:2202.08897 (2022)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Inadagbo, K., Arig, B., Alici, N., Isik, M.: Exploiting FPGA capabilities for accelerated biomedical computing. In: 2023 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA), pp. 48\u201353. IEEE (2023)","DOI":"10.23919\/SPA59660.2023.10274450"},{"key":"10_CR8","unstructured":"Isik, M.: A survey of spiking neural network accelerator on FPGA. arXiv preprint arXiv:2307.03910 (2023)"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Isik, M., Inadagbo, K.: Astrocyte-integrated dynamic function exchange in spiking neural networks. In: Kofro\u0148, J., Margaria, T., Seceleanu, C. (eds.) International Conference on Engineering of Computer-Based Systems, pp. 263\u2013273. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-49252-5_24","DOI":"10.1007\/978-3-031-49252-5_24"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Isik, M., Paul, A., Varshika, M.L., Das, A.: A design methodology for fault-tolerant computing using astrocyte neural networks. In: Proceedings of the 19th ACM International Conference on Computing Frontiers, pp. 169\u2013172 (2022)","DOI":"10.1145\/3528416.3530232"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Jia, X., et al.: XVDPU: a high performance CNN accelerator on the Versal platform powered by the AI engine. In: 2022 32nd International Conference on Field-Programmable Logic and Applications (FPL), pp. 01\u201309. IEEE (2022)","DOI":"10.1109\/FPL57034.2022.00041"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Kwon, H., Yoon, H., Park, K.W.: Poster: detecting audio adversarial example through audio modification. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2521\u20132523 (2019)","DOI":"10.1145\/3319535.3363246"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Liu, B., Yang, C., Li, H., Chen, Y., Wu, Q., Barnell, M.: Security of neuromorphic systems: challenges and solutions. In: 2016 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1326\u20131329. IEEE (2016)","DOI":"10.1109\/ISCAS.2016.7527493"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Madden, K., Harkin, J., McDaid, L., Nugent, C.: Adding security to networks-on-chip using neural networks. In: 2018 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1299\u20131306. IEEE (2018)","DOI":"10.1109\/SSCI.2018.8628832"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Maji, S., Lee, K., Gongye, C., Fei, Y., Chandrakasan, A.P.: An energy-efficient neural network accelerator with improved protections against fault-attacks. In: ESSCIRC 2023- IEEE 49th European Solid State Circuits Conference (ESSCIRC). pp. 233\u2013236 (2023). https:\/\/doi.org\/10.1109\/ESSCIRC59616.2023.10268746","DOI":"10.1109\/ESSCIRC59616.2023.10268746"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Marchisio, A., Pira, G., Martina, M., Masera, G., Shafique, M.: DVS-attacks: adversarial attacks on dynamic vision sensors for spiking neural networks. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20139. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9534364"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Merchant, F.: Security as an important ingredient in neuromorphic engineering. In: 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 314\u2013319. IEEE (2022)","DOI":"10.1109\/ISVLSI54635.2022.00068"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Peng, H., et al.: PASNet: polynomial architecture search framework for two-party computation-based secure neural network deployment. In: 2023 60th ACM\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2023)","DOI":"10.1109\/DAC56929.2023.10247663"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Perryman, N., Wilson, C., George, A.: Evaluation of Xilinx Versal architecture for next-gen edge computing in space. In: 2023 IEEE Aerospace Conference, pp. 1\u201311. IEEE (2023)","DOI":"10.1109\/AERO55745.2023.10115906"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Salehi, S., et al.: Neuromorphic-enabled security for IoT. In: 2022 20th IEEE Interregional NEWCAS Conference (NEWCAS), pp. 153\u2013157. IEEE (2022)","DOI":"10.1109\/NEWCAS52662.2022.9842256"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Sepulveda, J., Reinbrecht, C., Diguet, J.P.: Security aspects of neuromorphic MPSoCs. In: 2018 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1\u20136. IEEE (2018)","DOI":"10.1145\/3240765.3274038"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Staudigl, F., et al.: Fault injection in native logic-in-memory computation on neuromorphic hardware. arXiv preprint arXiv:2302.07655 (2023)","DOI":"10.1109\/DAC56929.2023.10247742"},{"key":"10_CR23","doi-asserted-by":"publisher","DOI":"10.3389\/fncir.2021.610446","volume":"15","author":"MH Tayarani-Najaran","year":"2021","unstructured":"Tayarani-Najaran, M.H., Schmuker, M.: Event-based sensing and signal processing in the visual, auditory, and olfactory domain: a review. Front. Neural Circuits 15, 610446 (2021)","journal-title":"Front. Neural Circuits"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Yang, C.H., Qi, J., Chen, P.Y., Ma, X., Lee, C.H.: Characterizing speech adversarial examples using self-attention U-Net enhancement. In: ICASSP 2020\u20132020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3107\u20133111. IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9053288"},{"key":"10_CR25","unstructured":"Yang, Z., Li, B., Chen, P.Y., Song, D.: Characterizing audio adversarial examples using temporal dependency. arXiv preprint arXiv:1809.10875 (2018)"},{"key":"10_CR26","unstructured":"Zhou, T., Luo, Y., Ren, S., Xu, X.: NNSplitter: an active defense solution to DNN model via automated weight obfuscation. arXiv preprint arXiv:2305.00097 (2023)"}],"container-title":["Lecture Notes in Computer Science","Applied Reconfigurable Computing. Architectures, Tools, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-55673-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T23:03:24Z","timestamp":1710198204000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-55673-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031556722","9783031556739"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-55673-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"10 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ARC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Applied Reconfigurable Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aveiro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"arc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.arc2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}