{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T04:36:13Z","timestamp":1741754173864,"version":"3.38.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T00:00:00Z","timestamp":1738886400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T00:00:00Z","timestamp":1738886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Lab","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"DOI":"10.1007\/s11063-025-11730-4","type":"journal-article","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T20:13:11Z","timestamp":1738959191000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Power Analysis Attacks on NVM Crossbar-based Neuromorphic Systems"],"prefix":"10.1007","volume":"57","author":[{"given":"Cory","family":"Merkel","sequence":"first","affiliation":[]},{"given":"Allen","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,7]]},"reference":[{"key":"11730_CR1","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.procs.2018.10.315","volume":"140","author":"M Ozdag","year":"2018","unstructured":"Ozdag M (2018) Adversarial attacks and defenses against deep neural networks: a survey. Proc Comput Sci 140:152\u2013161","journal-title":"Proc Comput Sci"},{"key":"11730_CR2","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199"},{"key":"11730_CR3","doi-asserted-by":"crossref","unstructured":"Chernikova A, Oprea A, Nita-Rotaru C, Kim B (2019) Are self-driving cars secure? evasion attacks against deep neural networks for steering angle prediction. In: 2019 IEEE Security and Privacy Workshops (SPW), pp. 132\u2013137 . IEEE","DOI":"10.1109\/SPW.2019.00033"},{"key":"11730_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107332","volume":"110","author":"X Ma","year":"2021","unstructured":"Ma X, Niu Y, Gu L, Wang Y, Zhao Y, Bailey J, Lu F (2021) Understanding adversarial attacks on deep learning based medical image analysis systems. Pattern Recogn 110:107332","journal-title":"Pattern Recogn"},{"key":"11730_CR5","doi-asserted-by":"crossref","unstructured":"Thys S, Van\u00a0Ranst W, Goedem\u00e9 T (2019) Fooling automated surveillance cameras: adversarial patches to attack person detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 0\u20130","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"11730_CR6","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11633-019-1211-x","volume":"17","author":"H Xu","year":"2020","unstructured":"Xu H, Ma Y, Liu H-C, Deb D, Liu H, Tang J-L, Jain AK (2020) Adversarial attacks and defenses in images, graphs and text: A review. Int J Autom Comput 17:151\u2013178","journal-title":"Int J Autom Comput"},{"issue":"3","key":"11730_CR7","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MDAT.2022.3161126","volume":"39","author":"S Bavikadi","year":"2022","unstructured":"Bavikadi S, Dhavlle A, Ganguly A, Haridass A, Hendy H, Merkel C, Reddi VJ, Sutradhar PR, Joseph A, Dinakarrao SMP (2022) A survey on machine learning accelerators and evolutionary hardware platforms. IEEE Design Test 39(3):91\u2013116","journal-title":"IEEE Design Test"},{"issue":"15","key":"11730_CR8","doi-asserted-by":"publisher","DOI":"10.1063\/1.5037835","volume":"124","author":"C Sung","year":"2018","unstructured":"Sung C, Hwang H, Yoo IK (2018) Perspective: A review on memristive hardware for neuromorphic computation. J Appl Phys 124(15):151903","journal-title":"J Appl Phys"},{"key":"11730_CR9","doi-asserted-by":"crossref","unstructured":"Roy D, Chakraborty I, Ibrayev T, Roy K (2021) On the intrinsic robustness of nvm crossbars against adversarial attacks. In: 2021 58th ACM\/IEEE Design Automation Conference (DAC), pp. 565\u2013570 . IEEE","DOI":"10.1109\/DAC18074.2021.9586202"},{"key":"11730_CR10","doi-asserted-by":"crossref","unstructured":"Cherupally SK, Rakin AS, Yin S, Seok M, Fan D, Seo J-s (2021) Leveraging noise and aggressive quantization of in-memory computing for robust dnn hardware against adversarial input and weight attacks. In: 2021 58th ACM\/IEEE Design Automation Conference (DAC), pp. 559\u2013564 . IEEE","DOI":"10.1109\/DAC18074.2021.9586233"},{"key":"11730_CR11","doi-asserted-by":"crossref","unstructured":"Bhattacharjee A, Bhatnagar L, Kim Y, Panda P (2021) Neat: Non-linearity aware training for accurate, energy-efficient and robust implementation of neural networks on 1t-1r crossbars. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","DOI":"10.1109\/TCAD.2021.3109857"},{"issue":"11","key":"11730_CR12","first-page":"4482","volume":"68","author":"A Moitra","year":"2021","unstructured":"Moitra A, Panda P (2021) Detectx adversarial input detection using current signatures in memristive xbar arrays. IEEE Trans Circ Syst I: Regular Papers 68(11):4482\u20134494","journal-title":"IEEE Trans Circ Syst I: Regular Papers"},{"key":"11730_CR13","doi-asserted-by":"crossref","unstructured":"Barve S, Shukla S, Dinakarrao SMP, Jha R (2021) Adversarial attack mitigation approaches using rram-neuromorphic architectures. In: Proceedings of the 2021 on Great Lakes Symposium on VLSI, pp. 201\u2013206","DOI":"10.1145\/3453688.3461757"},{"key":"11730_CR14","doi-asserted-by":"crossref","unstructured":"Merkel C (2022) Enhancing adversarial attacks on single-layer nvm crossbar-based neural networks with power consumption information. In: 2022 IEEE 35th International System-on-Chip Conference (SOCC), pp. 1\u20136 . IEEE","DOI":"10.1109\/SOCC56010.2022.9908114"},{"key":"11730_CR15","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"issue":"13","key":"11730_CR16","doi-asserted-by":"publisher","first-page":"1700875","DOI":"10.1002\/pssa.201700875","volume":"215","author":"X Zhang","year":"2018","unstructured":"Zhang X, Huang A, Hu Q, Xiao Z, Chu PK (2018) Neuromorphic computing with memristor crossbar. Phys Status Solidi 215(13):1700875","journal-title":"Phys Status Solidi"},{"issue":"5","key":"11730_CR17","doi-asserted-by":"publisher","first-page":"1811","DOI":"10.1039\/D0NA00100G","volume":"2","author":"L Shi","year":"2020","unstructured":"Shi L, Zheng G, Tian B, Dkhil B, Duan C (2020) Research progress on solutions to the sneak path issue in memristor crossbar arrays. Nanoscale Adv 2(5):1811\u20131827","journal-title":"Nanoscale Adv"},{"key":"11730_CR18","unstructured":"The MNIST database. http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"11730_CR19","unstructured":"The MSTAR dataset. https:\/\/www.sdms.afrl.af.mil\/index.php?collection=mstar"},{"key":"11730_CR20","unstructured":"The CIFAR-10 and CIFAR-100 datasets. https:\/\/www.cs.toronto.edu\/~kriz\/cifar.html"},{"key":"11730_CR21","unstructured":"Fashion MNIST. https:\/\/www.kaggle.com\/datasets\/zalando-research\/fashionmnist"},{"issue":"1","key":"11730_CR22","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/JPROC.2015.2494218","volume":"104","author":"B Shahriari","year":"2015","unstructured":"Shahriari B, Swersky K, Wang Z, Adams RP, De Freitas N (2015) Taking the human out of the loop: A review of bayesian optimization. Proc IEEE 104(1):148\u2013175","journal-title":"Proc IEEE"},{"key":"11730_CR23","doi-asserted-by":"crossref","unstructured":"Krestinskaya O, Zhang L, Salama KN (2023) Towards efficient in-memory computing hardware for quantized neural networks: State-of-the-art, open challenges and perspectives. IEEE Transactions on Nanotechnology","DOI":"10.1109\/TNANO.2023.3293026"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-025-11730-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11063-025-11730-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-025-11730-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T12:45:46Z","timestamp":1741697146000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11063-025-11730-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,7]]},"references-count":23,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["11730"],"URL":"https:\/\/doi.org\/10.1007\/s11063-025-11730-4","relation":{},"ISSN":["1573-773X"],"issn-type":[{"type":"electronic","value":"1573-773X"}],"subject":[],"published":{"date-parts":[[2025,2,7]]},"assertion":[{"value":"17 January 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"17"}}