{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:56:18Z","timestamp":1772823378871,"version":"3.50.1"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["OAC-2319962,CNS-2239672,CNS-2153690,CNS-2326597,CNS-2247892"],"award-info":[{"award-number":["OAC-2319962,CNS-2239672,CNS-2153690,CNS-2326597,CNS-2247892"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,28]]},"DOI":"10.1109\/iccad57390.2023.10323746","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T18:58:45Z","timestamp":1701370725000},"page":"1-9","source":"Crossref","is-referenced-by-count":16,"title":["MirrorNet: A TEE-Friendly Framework for Secure On-Device DNN Inference"],"prefix":"10.1109","author":[{"given":"Ziyu","family":"Liu","sequence":"first","affiliation":[{"name":"Northeastern University,Boston,MA,USA"}]},{"given":"Yukui","family":"Luo.","sequence":"additional","affiliation":[{"name":"Northeastern University,Boston,MA,USA"}]},{"given":"Shijin","family":"Duan","sequence":"additional","affiliation":[{"name":"Northeastern University,Boston,MA,USA"}]},{"given":"Tong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Northeastern University,Boston,MA,USA"}]},{"given":"Xiaolin","family":"Xu","sequence":"additional","affiliation":[{"name":"Northeastern University,Boston,MA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s20020342"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2962338"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5078799"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313591"},{"key":"ref5","first-page":"1955","article-title":"Mind your weight (s): A large-scale study on insufficient machine learning model protection in mobile apps","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Sun","year":"2021"},{"key":"ref6","first-page":"7105","article-title":"Nas-bench-101: Towards reproducible neural architecture search","volume-title":"International Conference on Machine Learning","author":"Ying","year":"2019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388946"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3411508.3421376"},{"key":"ref10","article-title":"Confidential deep learning: Executing proprietary models on untrusted devices","author":"VanNostrand","year":"2019","journal-title":"arXiv preprint"},{"key":"ref11","article-title":"Shadownet: A secure and efficient system for on-device model inference","author":"Sun","year":"2020","journal-title":"arXiv preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.07.051"},{"key":"ref13","article-title":"Non-transferable learning: A new approach for model ownership verification and applicability authorization","author":"Wang","year":"2021","journal-title":"arXiv preprint"},{"key":"ref14","first-page":"1","article-title":"Obfunas: A neural architecture search-based dnn obfuscation approach","volume-title":"Proceedings of the 41st IEEE\/ACM International Conference on Computer-Aided Design","author":"Zhou","year":"2022"},{"key":"ref15","article-title":"Communication-efficient bft protocols using small trusted hardware to tolerate minority corruption","author":"Yandamuri","year":"2021","journal-title":"Cryptology ePrint Archive"},{"key":"ref16","volume-title":"Raspberry pi 3 model b","author":"Pi","year":"2015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref19","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv preprint"},{"key":"ref20","volume-title":"The mnist database of handwritten digits","author":"LeCun","year":"1998"},{"key":"ref21","article-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017","journal-title":"arXiv preprint"},{"issue":"7","key":"ref22","first-page":"1","article-title":"Convolutional deep belief networks on cifar-10","volume":"40","author":"Krizhevsky","year":"2010","journal-title":"Unpublished manuscript"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5559552"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2947124"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28954-6_7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00038"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3536168.3543299"},{"key":"ref31","article-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware","author":"Tramer","year":"2018","journal-title":"arXiv preprint"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_11"},{"issue":"5","key":"ref33","first-page":"14","volume-title":"Lenet-5, convolutional neural networks","volume":"20","author":"LeCun","year":"2015"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1249"},{"key":"ref35","article-title":"The case for retraining of ml models for iot device identification at the edge","author":"Kolcun","year":"2020","journal-title":"arXiv preprint"},{"key":"ref36","first-page":"681","article-title":"Graviton: Trusted execution environments on gpus","author":"Volos","year":"2018","journal-title":"OSDI"},{"key":"ref37","volume-title":"Open portable trusted execution environment","author":"Limited","year":"2019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref40","author":"Xiao","year":"2017","journal-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms"},{"key":"ref41","author":"Krizhevsky","year":"2009","journal-title":"Learning multiple layers of features from tiny images"},{"key":"ref42","volume-title":"ARM Security Technology Building a Secure System using Trust-Zone Technology","year":"2009"},{"key":"ref43","article-title":"Intel sgx explained","author":"Costan","journal-title":"Cryptology ePrint Archive, 2016"},{"key":"ref44","first-page":"8","article-title":"Strengthening vm isolation with integrity protection and more","author":"Sev-Snp","year":"2020","journal-title":"White Paper, January"},{"key":"ref45","first-page":"857","article-title":"Sanctum: Minimal hardware extensions for strong software isolation","volume-title":"USENIX Security Symposium","author":"Costan","year":"2016"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23448"},{"key":"ref47","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv preprint"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-005-5724-z"}],"event":{"name":"2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,10,28]]},"end":{"date-parts":[[2023,11,2]]}},"container-title":["2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10323590\/10323543\/10323746.pdf?arnumber=10323746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T22:07:16Z","timestamp":1709417236000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10323746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,28]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/iccad57390.2023.10323746","relation":{},"subject":[],"published":{"date-parts":[[2023,10,28]]}}}