{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:57:26Z","timestamp":1775732246548,"version":"3.50.1"},"reference-count":109,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,1]]},"DOI":"10.1109\/iccad51958.2021.9643539","type":"proceedings-article","created":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T18:06:46Z","timestamp":1640282806000},"page":"1-9","source":"Crossref","is-referenced-by-count":43,"title":["Towards Energy-Efficient and Secure Edge AI: A Cross-Layer Framework ICCAD Special Session Paper"],"prefix":"10.1109","author":[{"given":"Muhammad","family":"Shafique","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Marchisio","sequence":"additional","affiliation":[]},{"given":"Rachmad Vidya","family":"Wicaksana Putra","sequence":"additional","affiliation":[]},{"given":"Muhammad Abdullah","family":"Hanif","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3076987"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2012.6237032"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2684746.2689060"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref30","author":"hanif","year":"2018","journal-title":"MPNA A Massively-Parallel Neural Array Accelerator With Dataflow Optimization for Convolutional Neural Networks"},{"key":"ref37","first-page":"1","article-title":"Drmap: A generic dram data mapping policy for energy-efficient processing of convolutional neural networks.","author":"putra","year":"2020","journal-title":"Proc of DAC"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI49217.2020.00051"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342033"},{"key":"ref34","article-title":"Caffeine: Toward uniformed representation and acceleration for deep convolutional neural networks","volume":"38","author":"zhang","year":"2018","journal-title":"IEEE TCAD"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022327"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00293"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415731"},{"key":"ref20","article-title":"Deep learning with limited numerical precision","author":"gupta","year":"2015","journal-title":"Proc of ICML"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218746"},{"key":"ref21","article-title":"Quantization and training of neural networks for efficient inteuer-arithmetic-onlv inference","author":"jacob","year":"2018","journal-title":"Proc of CVPR"},{"key":"ref24","author":"liu","year":"2018","journal-title":"DARTS Differentiable Architecture Search"},{"key":"ref23","author":"zoph","year":"2016","journal-title":"Neural architecture search with reinforcement learning"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/34.41384"},{"key":"ref26","first-page":"19","article-title":"Progressive neural architecture search","author":"liu","year":"2018","journal-title":"Proc of ECCV"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00186"},{"key":"ref25","first-page":"4095","article-title":"Efficient neural architecture search via parameters sharing","author":"pham","year":"2018","journal-title":"International Conference on Machine Learning"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116571"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00018"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317835"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465918"},{"key":"ref57","article-title":"Ft-cnn: Algorithm-based fault tolerance for convolutional neural networks","volume":"32","author":"zhao","year":"2021","journal-title":"IEEE TPDS"},{"key":"ref56","author":"mahmoud","year":"2020","journal-title":"Hardnn Feature map vulnerability evaluation in cnns"},{"key":"ref55","article-title":"Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks","author":"hong","year":"2019","journal-title":"Proc of USENIX"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ATS47505.2019.000-8"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99130-6_14"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126964"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317787"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00105"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3013049"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2020.2971217"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2018.00111"},{"key":"ref8","first-page":"1","article-title":"Descnet: Developing efficient scratchpad memories for capsule network hardware","author":"marchisio","year":"2020","journal-title":"IEEE TCAD"},{"key":"ref49","article-title":"Salvagednn: salvaging deep neural network accelerators with permanent faults through saliency-driven fault-aware mapping","volume":"378","author":"hanif","year":"2020","journal-title":"RSTA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2021.3060509"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2018.8474192"},{"key":"ref46","author":"sze","year":"2000","journal-title":"Circuit and method for rapid checking of error correction codes using cyclic redundancy check"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1147\/rd.62.0200"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2018.2839613"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2018.8368656"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116393"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342139"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2010.5457242"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942068"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0024"},{"key":"ref72","author":"gao","year":"2018","journal-title":"Panda facilitating usable ai development"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0381-1"},{"key":"ref70","author":"hesamifard","year":"2017","journal-title":"CryptoDL Deep neural networks over encrypted data"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2020.2984224"},{"key":"ref77","first-page":"193","article-title":"Chapter 8-side-channel attacks","author":"bhunia","year":"2019","journal-title":"Hardware Security"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715141"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2019.8854377"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_1"},{"key":"ref79","author":"hunt","year":"2018","journal-title":"Chiron Privacy-preserving machine learning as a service"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2006.73"},{"key":"ref62","article-title":"Enhancing nbti recovery in sram arrays through recovery boosting","volume":"20","author":"siddiqua","year":"2011","journal-title":"IEEE TVLSI"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744834"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2011.6105303"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9473943"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116247"},{"key":"ref66","author":"papernot","year":"2016","journal-title":"Towards the science of security and privacy in machine learning"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2019.8854425"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207635"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3039858"},{"key":"ref69","article-title":"Capsattacks: Robust and imperceptible adversarial attacks on capsule networks","volume":"abs 1901 9878","author":"marchisio","year":"2019","journal-title":"CoRR"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/IROS51168.2021.9636718"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586332"},{"key":"ref108","first-page":"774","article-title":"Securing deep spiking neural networks against adversarial attacks through inherent structural parameters","author":"ei-allami","year":"2021","journal-title":"Proc of DATE"},{"key":"ref94","first-page":"145","article-title":"A 0. 086-mm2 12. 7-pj\/sop 64k-synapse 256-neuron online-learning digital spiking neuromorphic processor in 28-nm cmos","volume":"13","author":"frenkel","year":"2018","journal-title":"IEEE TBCAS"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207351"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.112130359"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534364"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ISLPED.2017.8009176"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207297"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2013.2259038"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586281"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2474396"},{"key":"ref103","first-page":"1","article-title":"Respawn: Energy-efficient fault-tolerance for spiking neural networks considering unreliable memories","author":"putra","year":"2021","journal-title":"Proc of ICCAD"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2574707"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.3389\/fncom.2015.00099"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966075"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534087"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533738"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2005.853449"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593229"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342120"},{"key":"ref14","first-page":"3859","article-title":"Dynamic routing between capsules","author":"sabour","year":"2017","journal-title":"Proc of NIPS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3005348"},{"key":"ref16","first-page":"784","article-title":"Amc: Automl for model compression and acceleration on mobile devices","author":"he","year":"2018","journal-title":"Proc of ECCV"},{"key":"ref82","author":"kuper","year":"2018","journal-title":"Toward scalable verification for safety-critical deep networks"},{"key":"ref17","author":"li","year":"2016","journal-title":"Pruning filters for efficient convnets"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01090-4_1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489764"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.12.021"},{"key":"ref19","author":"han","year":"2015","journal-title":"Deep compression Compressing deep neural networks with pruning trained quantization and huffman coding"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274696"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207109"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01554-1_6"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68612-7_11"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00530"},{"key":"ref88","doi-asserted-by":"crossref","first-page":"1659","DOI":"10.1016\/S0893-6080(97)00011-7","article-title":"Networks of spiking neurons: the third generation of neural network models","volume":"10","author":"maass","year":"1997","journal-title":"Neural Networks"}],"event":{"name":"2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","location":"Munich, Germany","start":{"date-parts":[[2021,11,1]]},"end":{"date-parts":[[2021,11,4]]}},"container-title":["2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9643423\/9643432\/09643539.pdf?arnumber=9643539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:55:12Z","timestamp":1652187312000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9643539\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,1]]},"references-count":109,"URL":"https:\/\/doi.org\/10.1109\/iccad51958.2021.9643539","relation":{},"subject":[],"published":{"date-parts":[[2021,11,1]]}}}