{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:19:21Z","timestamp":1760080761511,"version":"3.37.3"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Doctoral College Resilient Embedded Systems through the TU Wien\u2019s Faculty of Informatics and the UAS Technikum Wien"},{"name":"NYUAD\u2019s Research Enhancement Fund (REF) Award on \u201ceDLAuto: An Automated Framework for Energy-Efficient Embedded Deep Learning in Autonomous Systems;\u201d"},{"name":"NYUAD Center for Artificial Intelligence and Robotics (CAIR) funded by Tamkeen under the NYUAD Research Institute","award":["CG010"],"award-info":[{"award-number":["CG010"]}]},{"DOI":"10.13039\/501100001824","name":"Czech Science Foundation","doi-asserted-by":"publisher","award":["GA22-02067S"],"award-info":[{"award-number":["GA22-02067S"]}],"id":[{"id":"10.13039\/501100001824","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Education, Youth and Sports of the Czech Republic through the e-INFRA CZ","award":["90140"],"award-info":[{"award-number":["90140"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3214312","type":"journal-article","created":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T19:34:06Z","timestamp":1665689646000},"page":"109043-109055","source":"Crossref","is-referenced-by-count":11,"title":["RoHNAS: A Neural Architecture Search Framework With Conjoint Optimization for Adversarial Robustness and Hardware Efficiency of Convolutional and Capsule Networks"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0689-4776","authenticated-orcid":false,"given":"Alberto","family":"Marchisio","sequence":"first","affiliation":[{"name":"Institute of Computer Engineering, Technische Universit&#x00E4;t Wien (TU Wien), Embedded Computing Systems Group, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9399-9313","authenticated-orcid":false,"given":"Vojtech","family":"Mrazek","sequence":"additional","affiliation":[{"name":"Evolvable Hardware Research Group, Faculty of Information Technology, Brno University of Technology, Brno, Czech Republic"}]},{"given":"Andrea","family":"Massa","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunications, VLSI Laboratory, Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2608-820X","authenticated-orcid":false,"given":"Beatrice","family":"Bussolino","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunications, VLSI Laboratory, Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3069-0319","authenticated-orcid":false,"given":"Maurizio","family":"Martina","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunications, VLSI Laboratory, Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2607-8135","authenticated-orcid":false,"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[{"name":"EBrain Laboratory, Division of Engineering, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3039858"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21918"},{"key":"ref3","first-page":"4092","article-title":"Efficient neural architecture search via parameters sharing","volume-title":"Proc. 35th Int. Conf. Mach. Learn. (ICML)","volume":"80","author":"Pham"},{"key":"ref4","first-page":"3856","article-title":"Dynamic routing between capsules","volume-title":"Proc. Adv. Neural Inf. Process. Syst. 30, Annu. Conf. Neural Inf. Process. Syst.","author":"Sabour"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00105"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2020.2971217"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342158"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VTS52500.2021.9794253"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643539"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.90"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01098"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00071"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref18","first-page":"265","article-title":"TensorFlow: A system for large-scale machine learning","volume-title":"Proc. 12th USENIX Symp. Operating Syst. Design Implement. (OSDI)","author":"Abadi"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISBI.2019.8759561"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP48234.2019.8959715"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1021\/ct2009208"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3323472"},{"key":"ref23","first-page":"1","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. 3rd Int. Conf. Learn. Represent. (ICLR)","author":"Goodfellow"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2018.8297407"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446747"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/fi12070113"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2021.3059518"},{"key":"ref30","first-page":"1","article-title":"Learning compositional structures for deep learning: Why routing-by-agreement is necessary","volume":"abs\/2010.01488","author":"Venkatraman","year":"2020","journal-title":"CoRR"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21735-7_6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2996282"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714922"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3030610"},{"key":"ref35","first-page":"1","article-title":"Neural architecture search with reinforcement learning","volume-title":"Proc. 5th Int. Conf. Learn. Represent. (ICLR)","author":"Zoph"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-46147-8_29"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.21236\/ada273556"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3126685"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022327"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00635"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2019.00293"},{"key":"ref42","first-page":"1","article-title":"On neural architecture search for resource-constrained hardware platforms","volume":"abs\/1911.00105","author":"Lu","year":"2019","journal-title":"CoRR"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317757"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3012863"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58517-4_32"},{"key":"ref46","first-page":"1","article-title":"Hardware-aware one-shot neural architecture search in coordinate ascent framework","volume":"abs\/1910.11609","author":"Zhang","year":"2019","journal-title":"CoRR"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01099"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3377929.3389962"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415731"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1098\/rspl.1895.0041"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2011.6105405"},{"key":"ref53","first-page":"1","article-title":"cleverhans V0.1: An adversarial machine learning library","volume":"abs\/1610.00768","author":"Goodfellow","year":"2016","journal-title":"CoRR"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09917535.pdf?arnumber=9917535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T02:31:15Z","timestamp":1706063475000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9917535\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3214312","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2022]]}}}