{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:01:39Z","timestamp":1775692899544,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001858","name":"VINNOVA (Sweden 's Innovation Agency) through the Trust-E project of the Eureka PENTA and EURIPIDES programmes","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001862","name":"VR (Swedish Research Council)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001862","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1109\/dft52944.2021.9568340","type":"proceedings-article","created":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T19:30:07Z","timestamp":1634758207000},"page":"1-6","source":"Crossref","is-referenced-by-count":12,"title":["The Impact of Faults on DNNs: A Case Study"],"prefix":"10.1109","author":[{"given":"Elaheh","family":"Malekzadeh","sequence":"first","affiliation":[]},{"given":"Nezam","family":"Rohbani","sequence":"additional","affiliation":[]},{"given":"Zhonghai","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Masoumeh","family":"Ebrahimi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref11","article-title":"Benchmarking neural network robustness to common corruptions and perturbations","author":"hendrycks","year":"2019","journal-title":"ar Xiv preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2019.00040"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207560"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3278519"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2018.8301749"},{"key":"ref16","first-page":"493","article-title":"Entropy-based modeling for estimating adversarial bit-flip attack impact on binarized neural network","author":"khoshavi","year":"0","journal-title":"Proc ASP-DAC"},{"key":"ref17","article-title":"Ra-bnn: Constructing robust & accurate binary neural network to simultaneously defend adversarial bit-flip attack and improve accuracy","author":"rakin","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref18","first-page":"1463","article-title":"Deephammer: Depleting the intelligence of deep neural networks through targeted chain of bit flips","author":"yao","year":"0","journal-title":"Security Symposium (USENIX Security 20)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC47756.2020.9045134"},{"key":"ref28","first-page":"8024","article-title":"Pytorch: An imperative style, high-performance deep learning library","author":"paszke","year":"2019","journal-title":"Advances in Neural Information Processing Systems 32 Curran Associates Inc"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1993.298655"},{"key":"ref27","author":"lecun","year":"0","journal-title":"The MNIST Database of Handwritten Digits"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2742698"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1990.137651"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2019.2911540"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92137-0_28"},{"key":"ref8","first-page":"118","article-title":"Quan-tification of the impact of random hardware faults on safety-critical ai applications: Cnn-based traffic sign recognition case study","author":"beyer","year":"0","journal-title":"ISSREW IEEE International Symposium on IEEE"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2018.00077"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2786763.2694348"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2019.8704548"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.46"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317908"},{"key":"ref22","first-page":"497","article-title":"Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks","author":"hong","year":"0","journal-title":"Security Symposium (USENIX Security 19)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218665"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00130"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2018.8474192"},{"key":"ref26","article-title":"T-bfa: Targeted bit-flip adversarial weight attack","author":"rakin","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317805"}],"event":{"name":"2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","location":"Athens, Greece","start":{"date-parts":[[2021,10,6]]},"end":{"date-parts":[[2021,10,8]]}},"container-title":["2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9568273\/9568279\/09568340.pdf?arnumber=9568340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:47:21Z","timestamp":1652197641000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9568340\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/dft52944.2021.9568340","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}