{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:50:14Z","timestamp":1775580614022,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/iccad.2017.8203770","type":"proceedings-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T22:02:04Z","timestamp":1513288924000},"page":"131-138","source":"Crossref","is-referenced-by-count":159,"title":["Fault injection attack on deep neural network"],"prefix":"10.1109","author":[{"given":"Yannan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Lingxiao","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"ref11","article-title":"Precise laser fault injections into 90 nm and 45 nm sram-cells","author":"selmke","year":"2015","journal-title":"Proc Conf Smart Card Research and Advanced Applications (CARDIS '04)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2010.5560194"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"ref14","article-title":"Flip feng shui: Hammering a needle in the software stack","author":"razavi","year":"2016","journal-title":"Proc of USENIX Security Symposium"},{"key":"ref15","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459469"},{"key":"ref17","article-title":"Rectified linear units improve restricted boltzmann machines","author":"nair","year":"2010","journal-title":"Proc of International Conference on Machine Learning (ICML-05)"},{"key":"ref18","article-title":"Flexible, high performance convolutional neural networks for image classification","author":"ciresan","year":"2011","journal-title":"Proc of International Joint Conference on Artificial Intelligence (IJCAI)"},{"key":"ref19","author":"springenberg","year":"2014","journal-title":"Striving for simplicity The all convolutional net"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2001.990309"},{"key":"ref4","author":"szegedy","year":"2013","journal-title":"Intriguing properties of neural networks"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/72.363479"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DFTVS.2004.1347858"},{"key":"ref5","author":"goodfellow","year":"2014","journal-title":"Explaining and Harnessing Adversarial Examples"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.25080\/Majora-92bf1922-003","article-title":"Theano: A CPU and GPU math compiler in python","author":"bergstra","year":"2010","journal-title":"Proc Python in Science Conf"},{"key":"ref7","author":"gu","year":"2014","journal-title":"Towards deep neural network architectures robust to adversarial examples"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2012.02.023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541967"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"ref20","article-title":"Rectifier nonlinearities improve neural network acoustic models","author":"maas","year":"2013","journal-title":"Proc of International Conference on Machine Learning (ICML-05)"},{"key":"ref22","article-title":"One bit flips, one cloud flops: Cross-vm row hammer attacks and privilege escalation","author":"xiao","year":"2016","journal-title":"Proc of USENIX Security Symposium"},{"key":"ref21","article-title":"DFA on AES","author":"giraud","year":"2004","journal-title":"Advanced Encryption Standard - AES"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.1997.643927"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1992.226957"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2000.861360"}],"event":{"name":"2017 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)","location":"Irvine, CA","start":{"date-parts":[[2017,11,13]]},"end":{"date-parts":[[2017,11,16]]}},"container-title":["2017 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8167715\/8203744\/08203770.pdf?arnumber=8203770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T09:08:05Z","timestamp":1603530485000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8203770\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iccad.2017.8203770","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}