{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T23:03:30Z","timestamp":1774134210647,"version":"3.50.1"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/coins49042.2020.9191672","type":"proceedings-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T21:18:24Z","timestamp":1599772704000},"page":"1-7","source":"Crossref","is-referenced-by-count":19,"title":["AITIA: Embedded AI Techniques for Embedded Industrial Applications"],"prefix":"10.1109","author":[{"given":"Marcelo","family":"Brandalero","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Laurens","family":"Le Jeune","sequence":"additional","affiliation":[]},{"given":"Hector Gerardo Munoz","family":"Hernandez","sequence":"additional","affiliation":[]},{"given":"Mitko","family":"Veleski","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"da Silva","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Lemeire","sequence":"additional","affiliation":[]},{"given":"Kristof","family":"Van Beeck","sequence":"additional","affiliation":[]},{"given":"Abdellah","family":"Touhafi","sequence":"additional","affiliation":[]},{"given":"Toon","family":"Goedeme","sequence":"additional","affiliation":[]},{"given":"Nele","family":"Mentens","sequence":"additional","affiliation":[]},{"given":"Diana","family":"Gohringer","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Hubner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622568"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70139-4_87"},{"key":"ref33","year":"0","journal-title":"1998 DARPA Intrusion Detection Evaluation Data Set"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref31","year":"0","journal-title":"KDD Cup 1999 data"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933165"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2019.00025"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CICTA.2018.8706067"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2018.8390278"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2705069"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2018.00052"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2018.00041"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11973-7_29"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2018.8445118"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.snb.2016.02.081"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/elan.201800682"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ReCoSoC.2018.8449381"},{"key":"ref19","first-page":"6563","article-title":"A failure detection methodology using new features of acoustic images of a fan matrix","volume":"259","author":"del val","year":"2019","journal-title":"INTER-NOISE and NOISE-CON Congress and Conference Proceedings"},{"key":"ref28","author":"roesch","year":"0","journal-title":"SNORT network intrusion detection system"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3337801.3337804"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3186332"},{"key":"ref6","article-title":"Efficient Recurrent Neural Networks using Structured Matrices in FPGAs","author":"li","year":"2018","journal-title":"arXiv 1803 07661 [cs stat]"},{"key":"ref29","year":"0","journal-title":"Suricata &#x2014; Open Source IDS \/ IPS \/ NSM engine"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2019.00035"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2934583.2934644"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78890-6_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898003"},{"key":"ref9","first-page":"268","article-title":"FPGAbased CNN inference accelerator synthesized from multi-threaded C software","author":"kim","year":"2017","journal-title":"SOCC&#x2019;17"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2016.7929549"},{"key":"ref46","article-title":"Accelerating CNN inference on fpgas: A survey","volume":"abs 1806 1683","author":"abdelouahab","year":"2018","journal-title":"CoRR"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2018.8713356"},{"key":"ref45","article-title":"Ristretto: Hardware-oriented approximation of convolutional neural networks","volume":"abs 1605 6402","author":"gysel","year":"2016","journal-title":"CoRR"},{"key":"ref48","year":"0","journal-title":"RISC-V Cores and SoC Overview"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2009.0164"},{"key":"ref47","year":"0","journal-title":"RISC-V"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05269-4_18"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2317736"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1088\/0957-0233\/20\/10\/104015"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2014.2336271"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/app9183885"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2018.2815603"},{"key":"ref26","article-title":"The Zeek Network Security Monitor","author":"sommer","year":"0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2019.8923468"},{"key":"ref25","article-title":"An introduction to intrusion-detection systems","author":"debar","year":"2002","journal-title":"Proceedings of Connect&#x2019;2000"}],"event":{"name":"2020 International Conference on Omni-layer Intelligent Systems (COINS)","location":"Barcelona, Spain","start":{"date-parts":[[2020,8,31]]},"end":{"date-parts":[[2020,9,2]]}},"container-title":["2020 International Conference on Omni-layer Intelligent Systems (COINS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9186550\/9191368\/09191672.pdf?arnumber=9191672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:57:05Z","timestamp":1656345425000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9191672\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/coins49042.2020.9191672","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}