{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:51:29Z","timestamp":1763704289885,"version":"3.45.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,26]]},"DOI":"10.1109\/iccad66269.2025.11240691","type":"proceedings-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:39:34Z","timestamp":1763663974000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Invited Paper: Rowhammer Mitigation by Approximate Computing: A Compressed Sensing Case Study"],"prefix":"10.1109","author":[{"given":"Yuhang","family":"Hao","sequence":"first","affiliation":[{"name":"Queen&#x2019;s University Belfast,Centre for Secure Information Technologies (CSIT),Belfast,UK"}]},{"given":"Yun","family":"Wu","sequence":"additional","affiliation":[{"name":"Queen&#x2019;s University Belfast,School of Electronics, Electrical Engineering and Computer Science,Belfast,UK"}]},{"given":"Minmin","family":"Jiang","sequence":"additional","affiliation":[{"name":"Queen&#x2019;s University Belfast,Centre for Secure Information Technologies (CSIT),Belfast,UK"}]},{"given":"M\u00e1ire","family":"O\u2019Neill","sequence":"additional","affiliation":[{"name":"Queen&#x2019;s University Belfast,Centre for Secure Information Technologies (CSIT),Belfast,UK"}]},{"given":"Chongyan","family":"Gu","sequence":"additional","affiliation":[{"name":"Queen&#x2019;s University Belfast,Centre for Secure Information Technologies (CSIT),Belfast,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3030121"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRC.2016.7738674"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3243497"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3299874.3319453"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3386263.3407594"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST59942.2023.10409381"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446747"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"issue":"71","key":"ref9","first-page":"2","article-title":"Exploiting the dram rowhammer bug to gain kernel privileges","volume":"15","author":"Seaborn","year":"2015","journal-title":"Black Hat"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00020"},{"key":"ref11","first-page":"565","article-title":"{DRAMA}: Exploiting {DRAM} addressing for {Cross-CPU} attacks","volume-title":"25th USENIX security symposium (USENIX security 16)","author":"Pessl"},{"key":"ref12","first-page":"1615","article-title":"{ZenHammer}: Rowhammer attacks on {AMD} zen-based platforms","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Jattke"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/Eusipco47968.2020.9287749"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00059"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2915318"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2021.3116471"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76526-6"},{"key":"ref20","article-title":"Vitis high-level synthesis user guide (ug1399)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3282172"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33715-4_54"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP45357.2019.8969177"}],"event":{"name":"2025 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","start":{"date-parts":[[2025,10,26]]},"location":"Munich, Germany","end":{"date-parts":[[2025,10,30]]}},"container-title":["2025 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11240608\/11240621\/11240691.pdf?arnumber=11240691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:43:05Z","timestamp":1763703785000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11240691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,26]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iccad66269.2025.11240691","relation":{},"subject":[],"published":{"date-parts":[[2025,10,26]]}}}