{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:12:46Z","timestamp":1755839566649,"version":"3.37.3"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,11]],"date-time":"2023-06-11T00:00:00Z","timestamp":1686441600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,11]],"date-time":"2023-06-11T00:00:00Z","timestamp":1686441600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004147","name":"Tsinghua University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004147","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,11]]},"DOI":"10.1109\/aicas57966.2023.10168612","type":"proceedings-article","created":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T18:24:30Z","timestamp":1688754270000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["WeightLock: A Mixed-Grained Weight Encryption Approach Using Local Decrypting Units for Ciphertext Computing in DNN Accelerators"],"prefix":"10.1109","author":[{"given":"Jianfeng","family":"Wang","sequence":"first","affiliation":[{"name":"Tsinghua University,BNRist, EE"}]},{"given":"Zhonghao","family":"Chen","sequence":"additional","affiliation":[{"name":"Tsinghua University,BNRist, EE"}]},{"given":"Yiming","family":"Chen","sequence":"additional","affiliation":[{"name":"Tsinghua University,BNRist, EE"}]},{"given":"Yixin","family":"Xu","sequence":"additional","affiliation":[{"name":"Penn State University"}]},{"given":"Tianyi","family":"Wang","sequence":"additional","affiliation":[{"name":"Daimler Greater China Ltd"}]},{"given":"Yao","family":"Yu","sequence":"additional","affiliation":[{"name":"Daimler Greater China Ltd"}]},{"given":"Vijaykrishnan","family":"Narayanan","sequence":"additional","affiliation":[{"name":"Penn State University"}]},{"given":"Sumitha","family":"George","sequence":"additional","affiliation":[{"name":"North Dakota State University"}]},{"given":"Huazhong","family":"Yang","sequence":"additional","affiliation":[{"name":"Tsinghua University,BNRist, EE"}]},{"given":"Xueqing","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University,BNRist, EE"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415678"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218651"},{"key":"ref23","first-page":"60","article-title":"Learning Multiple Layers of Features from Tiny Images","author":"krizhevsky","year":"2009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3136601"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530440"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3078408"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2230219"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref10","first-page":"19","article-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference","author":"juvekar","year":"0"},{"article-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition","year":"2015","author":"simonyan","key":"ref21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0034-5"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2021.3092533"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ESSCIRC.2018.8494319"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2021.3125255"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2014.6757433"},{"key":"ref18","first-page":"763","article-title":"Static Physically Unclonable Functions for Secure Chip Identification With 1.9&#x2013;5.8% Native Bit Instability at 0.6&#x2013;1 V and 15 fJ\/bit in 65 nm","volume":"51","author":"alvarez","year":"2016","journal-title":"IEEE JSSC"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ATS52891.2021.00013"},{"key":"ref7","first-page":"1","article-title":"Layer-Wise Security Protection for Deep Neural Networks in Industrial Cyber Physical Systems","author":"jiang","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3018403"},{"key":"ref4","first-page":"633","article-title":"P3M: a PIM-based neural network model protection scheme for deep learning accelerator","author":"li","year":"0","journal-title":"Proceedings of the 24th APDAC"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/jlpea11040036"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942041"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2019.8758660"}],"event":{"name":"2023 IEEE 5th International Conference on Artificial Intelligence Circuits and Systems (AICAS)","start":{"date-parts":[[2023,6,11]]},"location":"Hangzhou, China","end":{"date-parts":[[2023,6,13]]}},"container-title":["2023 IEEE 5th International Conference on Artificial Intelligence Circuits and Systems (AICAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10168547\/10168548\/10168612.pdf?arnumber=10168612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T17:33:07Z","timestamp":1690219987000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10168612\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,11]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/aicas57966.2023.10168612","relation":{},"subject":[],"published":{"date-parts":[[2023,6,11]]}}}