{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T04:04:39Z","timestamp":1767845079283,"version":"3.49.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,28]]},"DOI":"10.1109\/iccad57390.2023.10323671","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T13:58:45Z","timestamp":1701352725000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Invited Paper: Hyperdimensional Computing for Resilient Edge Learning"],"prefix":"10.1109","author":[{"given":"Hamza Errahmouni","family":"Barkam","sequence":"first","affiliation":[{"name":"University of California,Irvine"}]},{"given":"SungHeon Eavn","family":"Jeon","sequence":"additional","affiliation":[{"name":"University of California,Irvine"}]},{"given":"Sanggeon","family":"Yun","sequence":"additional","affiliation":[{"name":"University of California,Irvine"}]},{"given":"Calvin","family":"Yeung","sequence":"additional","affiliation":[{"name":"University of California,Irvine"}]},{"given":"Zhuowen","family":"Zou","sequence":"additional","affiliation":[{"name":"University of California,Irvine"}]},{"given":"Xun","family":"Jiao","sequence":"additional","affiliation":[{"name":"Vilanova University"}]},{"given":"Narayan","family":"Srinivasa","sequence":"additional","affiliation":[{"name":"Intel Labs"}]},{"given":"Mohsen","family":"Imani","sequence":"additional","affiliation":[{"name":"University of California,Irvine"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2023.3289325"},{"key":"ref35","author":"khalid","year":"2018","journal-title":"Fademl Understanding the impact of pre-processing noise filtering on adversarial machine learning"},{"key":"ref12","first-page":"25","article-title":"Brain-inspired hyperdimensional computing for ultra-efficient edge ai","author":"amrouch","year":"0","journal-title":"2022 International Conference on HardwarelSoftware Codesign and System Synthesis (CODES+ISSS)"},{"key":"ref34","author":"jin","year":"2020","journal-title":"Is bert really robust? a strong baseline for natural language attack on text classification and entailment"},{"key":"ref15","first-page":"64","article-title":"A robust and energy-efficient classifier using brain-inspired hyper-dimensional computing","author":"rahimi","year":"0","journal-title":"ISLPED"},{"key":"ref37","first-page":"1177","article-title":"Random features for large-scale kernel machines","author":"rahimi","year":"2008","journal-title":"Advances in neural information processing systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-009-9009-8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714821"},{"key":"ref31","author":"szegedy","year":"2014","journal-title":"Intriguing properties of neural networks"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-020-01634-y"},{"key":"ref11","first-page":"1","article-title":"Hdgim: Hyperdimensional genome sequence matching on unre-liable highly scaled fefet","author":"barkam","year":"0","journal-title":"2023 Design Automation & Test in Europe Conference & Exhibition (DATE)"},{"key":"ref33","author":"morris","year":"2020","journal-title":"Textattack A framework for adversarial attacks data augmentation and adversarial training in nlp"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"19201","DOI":"10.1038\/s41598-022-23116-w","article-title":"Achieving software-equivalent accuracy for hyperdimensional computing with ferroelectric-based in-memory computing","volume":"12","author":"kazemi","year":"2022","journal-title":"Scientific Reports"},{"key":"ref32","author":"moosavi-dezfooli","year":"2016","journal-title":"Deepfool a simple and accurate method to fool deep neural networks"},{"key":"ref2","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"ArXiv Preprint"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3508352.3549477"},{"key":"ref39","author":"chakraborty","year":"2018","journal-title":"Adver-sarial attacks and defences A survey"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530668"},{"key":"ref38","first-page":"301","article-title":"The kernel trick for distances","author":"schilkopf","year":"0","journal-title":"NIPS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD56317.2022.00082"},{"key":"ref18","first-page":"292","article-title":"Algorithm-hardware co-design for efficient brain-inspired hyperdimensionallearning on edge","author":"ni","year":"0","journal-title":"2022 Design Automation & Test in Europe Conference & Exhibition (DATE)"},{"key":"ref24","author":"wiyatno","year":"2018","journal-title":"Maximal jacobian-based saliency map attack"},{"key":"ref46","first-page":"1591","article-title":"Hdcluster: An accurate clus-tering using brain-inspired high-dimensional computing","author":"imani","year":"0","journal-title":"2019 Design Automation Test in Europe Conference Exhibition (DATE)"},{"key":"ref23","author":"goodfellow","year":"2015","journal-title":"Explaining and Harnessing Adversarial Examples"},{"key":"ref45","author":"xiao","year":"2017","journal-title":"Fashion-mnist a novel image dataset for benchmarking machine learning algorithms"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuron.2014.07.035"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317785"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3508352.3549437"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1186\/s42492-019-0016-7"},{"key":"ref41","author":"madry","year":"2017","journal-title":"Towards deep learning models resistant to adversarial attacks"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586169"},{"key":"ref44","author":"cohen","year":"2017","journal-title":"EMNIST an extension of MNIST to handwritten letters"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-22364-0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"ref28","author":"yang","year":"2020","journal-title":"Adversarial attacks on brain-inspired hyperdimensional computing-based classifiers"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3480958"},{"key":"ref29","article-title":"Res-hd: Resilient intelligent fault diagnosis against adversarial attacks using hyper-dimensional computing","author":"gungor","year":"2022","journal-title":"ArXiv Preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527422"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2022.757125"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2022.858329"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2019.00076"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.51"},{"key":"ref6","first-page":"56","article-title":"Onlinehd: Robust, efficient, and single-pass online learning using hyperdimensional system","author":"hernandez-cane","year":"0","journal-title":"DATE"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2015.22"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00027"}],"event":{"name":"2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,10,28]]},"end":{"date-parts":[[2023,11,2]]}},"container-title":["2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10323590\/10323543\/10323671.pdf?arnumber=10323671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T17:57:43Z","timestamp":1701367063000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10323671\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,28]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/iccad57390.2023.10323671","relation":{},"subject":[],"published":{"date-parts":[[2023,10,28]]}}}