{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:11:01Z","timestamp":1725729061551},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T00:00:00Z","timestamp":1668124800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T00:00:00Z","timestamp":1668124800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,11]]},"DOI":"10.1109\/apccas55924.2022.10090286","type":"proceedings-article","created":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T17:25:39Z","timestamp":1681233939000},"page":"414-418","source":"Crossref","is-referenced-by-count":0,"title":["Thermometer Code of Log Mel-Frequency Spectral Coefficient for BNN-based Keyword Spotting System"],"prefix":"10.1109","author":[{"given":"Yuzhong","family":"Jiao","sequence":"first","affiliation":[{"name":"Simbury Limited,Hong Kong,China"}]},{"given":"Yiu Kei","family":"Li","sequence":"additional","affiliation":[{"name":"Simbury Limited,Hong Kong,China"}]},{"given":"Chi Hong","family":"Chan","sequence":"additional","affiliation":[{"name":"Simbury Limited,Hong Kong,China"}]},{"given":"Yun","family":"Li","sequence":"additional","affiliation":[{"name":"Simbury Limited,Hong Kong,China"}]},{"given":"Zhilin","family":"Ai","sequence":"additional","affiliation":[{"name":"Simbury Limited,Hong Kong,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"JavaScript Convolutional Neural Networks for Keyword Spotting in the Browser: An Experimental Analysis","author":"Lee","year":"2018","journal-title":"arXiv"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3142525"},{"key":"ref3","article-title":"End-to-end Keyword Spotting using Neural Architecture Search and Quantization","author":"Peter","year":"2021","journal-title":"arXiv"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2005-142"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3335-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2018-1661"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3297156.3297254"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIGSYS.2019.8811070"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2014.2339736"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698585"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462440"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EDTM50988.2021.9421028"},{"key":"ref13","article-title":"Ternary weight networks","author":"Li","year":"2016","journal-title":"arXiv"},{"key":"ref14","article-title":"Quantized neural networks: Training neural networks with low precision weights and activations","author":"Hubara","year":"2016","journal-title":"arXiv"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_32"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00826"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GCAIoT51063.2020.9345815"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533393"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GCAIoT53516.2021.9693045"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU46091.2019.9004005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924340"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.23919\/VLSIC.2019.8777994"},{"key":"ref23","article-title":"Using Capsule Networks with Thermometer Encoding to Defend Against Adversarial Attacks","author":"Garg","year":"2017","journal-title":"The CS229 Final Project Session, Stanford, USA"},{"article-title":"Thermometer encoding: One hot way to resist adversarial examples","volume-title":"2018 International Conference on Learning Representations","author":"Buckman","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/BRACIS.2016.029"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465852"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2018.2869150"},{"key":"ref28","article-title":"Speech commands: A dataset for limited-vocabulary speech recognition","author":"Warden","year":"2018","journal-title":"arXiv"},{"key":"ref29","article-title":"Binarized neural networks: Training deep neural networks with weights and activations constrained to+ l or-I","author":"Courbariaux","year":"2016","journal-title":"arXiv preprint"},{"key":"ref31","article-title":"Honk: A PyTorch reimplementation of convolutional neural networks for keyword spotting","author":"Tang","year":"2017","journal-title":"arXiv"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462688"}],"event":{"name":"2022 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)","start":{"date-parts":[[2022,11,11]]},"location":"Shenzhen, China","end":{"date-parts":[[2022,11,13]]}},"container-title":["2022 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10090225\/10090247\/10090286.pdf?arnumber=10090286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T11:30:33Z","timestamp":1709465433000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10090286\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,11]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/apccas55924.2022.10090286","relation":{},"subject":[],"published":{"date-parts":[[2022,11,11]]}}}