{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:10:37Z","timestamp":1755925837149,"version":"3.44.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/coins65080.2025.11125735","type":"proceedings-article","created":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:57:49Z","timestamp":1755907069000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Privacy by Design via Novel Memory Technologies"],"prefix":"10.1109","author":[{"given":"Hritom","family":"Das","sequence":"first","affiliation":[{"name":"Oklahoma State University,Department of ECE,USA,74078"}]},{"given":"Mario","family":"Renteria-Pinon","sequence":"additional","affiliation":[{"name":"New Mexico State University,Department of ECE,USA,88003"}]},{"given":"Na","family":"Gong","sequence":"additional","affiliation":[{"name":"University of South Alabama,Department of ECE,Mobile,USA,36688"}]},{"given":"Jianqing","family":"Liu","sequence":"additional","affiliation":[{"name":"NC State University,Department of CS,Raleigh,USA,27606"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2023.3337094"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3382630"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2012.2231018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2105550"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI61997.2024.00085"},{"issue":"2009","key":"ref6","first-page":"12","article-title":"Privacy by design: The 7 foundational principles","volume":"5","author":"Cavoukian","year":"2009","journal-title":"Information and privacy commissioner of Ontario, Canada"},{"issue":"3","key":"ref7","first-page":"25","article-title":"Engineering privacy by design","volume":"14","author":"G\u00fcrses","year":"2011","journal-title":"Computers, Privacy & Data Protection"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref9","article-title":"Privacy loss in apple\u2019s implementation of differential privacy on macos 10.12","author":"Tang","year":"2017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3226070"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2005.859030"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2013.2291064"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2010.2091321"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2014.2332267"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2015.2461592"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2890383"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/4.881209"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2025.3569147"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISOCC.2014.7087595"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EDSSC.2015.7285053"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/el.2015.2237"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5573\/JSTS.2016.16.6.781"},{"key":"ref23","article-title":"A gain cell edram in logic cmos technology","author":"Cheng","year":"2015"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS54063.2022.9859294"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3583781.3590211"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3583781.3590210"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3583781.3590283"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2023.3301020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-58947-2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2023.3312163"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS57524.2023.10406136"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS57524.2023.10406099"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI61997.2024.00044"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI61997.2024.00081"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1038\/s44335-024-00017-x"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3156274"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3283409"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2750699"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103605"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3329971"},{"key":"ref41","article-title":"Upcycling noise for federated unlearning","author":"Chen","year":"2024"}],"event":{"name":"2025 IEEE International Conference on Omni-layer Intelligent Systems (COINS)","location":"Madison, WI, USA","start":{"date-parts":[[2025,8,4]]},"end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Omni-layer Intelligent Systems (COINS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11125678\/11125719\/11125735.pdf?arnumber=11125735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T04:45:38Z","timestamp":1755924338000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11125735\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/coins65080.2025.11125735","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}