{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:43:30Z","timestamp":1765439010027,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,29]]},"DOI":"10.1109\/icccn61486.2024.10637594","type":"proceedings-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T17:55:28Z","timestamp":1724349328000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Towards Protecting On-Device Machine Learning with RISC-V based Multi-Enclave TEE"],"prefix":"10.1109","author":[{"given":"Yongzhi","family":"Wang","sequence":"first","affiliation":[{"name":"Texas A&amp;M University-Corpus Christi,Department of Computer Science,Corpus Christi,TX,USA"}]},{"given":"Venkata Sai","family":"Ramya Padmasri Boggaram","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University-Corpus Christi,Department of Computer Science,Corpus Christi,TX,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3450494"},{"key":"ref2","article-title":"On-device machine learning"},{"key":"ref3","article-title":"Machine Learning - Apple Developer \u2014 developer.apple.com"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3617177"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559388"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2947124"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"ref8","article-title":"Intel sgx explained","author":"Costan","year":"2016","journal-title":"Cryptology ePrint Archive"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"article-title":"The industry-first secure iot stack for risc-v: a research project","volume-title":"RISC-V Workshop","author":"Pinto","key":"ref10"},{"key":"ref11","article-title":"Jetson nano"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ccgrid49817.2020.00-41"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179382"},{"key":"ref14","first-page":"723","article-title":"SOTER: Guarding black-box inference for general neural networks at the edge","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Shen"},{"key":"ref15","first-page":"41","article-title":"Qemu, a fast and portable dynamic translator","volume-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference","author":"Bellard"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28954-6_7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358646"},{"key":"ref18","first-page":"8178","article-title":"Reverse-engineering deep ReLU networks","volume-title":"Proceedings of the 37th International Conference on Machine Learning","volume":"119","author":"Rolnick"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24178"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2019.00044"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00368"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413592"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"ref24","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Juvekar"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388946"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3126315"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01029"},{"key":"ref28","first-page":"2117","article-title":"Blacklight: Scalable defense for neural networks against {Query-Based}{Black-Box} attacks","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Li"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623116"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339819"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323047"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427232"},{"key":"ref35","article-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware","volume-title":"7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6-9, 2019","author":"Tram\u00e8r","year":"2019"}],"event":{"name":"2024 33rd International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2024,7,29]]},"location":"Kailua-Kona, HI, USA","end":{"date-parts":[[2024,7,31]]}},"container-title":["2024 33rd International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10637481\/10637507\/10637594.pdf?arnumber=10637594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:36:34Z","timestamp":1725428194000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10637594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,29]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icccn61486.2024.10637594","relation":{},"subject":[],"published":{"date-parts":[[2024,7,29]]}}}