{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:33:55Z","timestamp":1770842035935,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,31]],"date-time":"2021-01-31T00:00:00Z","timestamp":1612051200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,31]],"date-time":"2021-01-31T00:00:00Z","timestamp":1612051200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,31]],"date-time":"2021-01-31T00:00:00Z","timestamp":1612051200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,31]]},"DOI":"10.1109\/iceic51217.2021.9369754","type":"proceedings-article","created":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T22:01:44Z","timestamp":1615413704000},"page":"1-4","source":"Crossref","is-referenced-by-count":14,"title":["Time to Leak: Cross-Device Timing Attack On Edge Deep Learning Accelerator"],"prefix":"10.1109","author":[{"given":"Yoo-Seung","family":"Won","sequence":"first","affiliation":[]},{"given":"Soham","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Dirmanto","family":"Jap","sequence":"additional","affiliation":[]},{"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[]},{"given":"Arindam","family":"Basu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2019.00032"},{"key":"ref11","author":"hong","year":"2018","journal-title":"Security analysis of deep neural networks operating in the presence of cache side-channel attacks"},{"key":"ref12","author":"yu","year":"0","journal-title":"DeepEM Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage"},{"key":"ref13","year":"0","journal-title":"Neural Compute Stick 2"},{"key":"ref14","year":"0","journal-title":"EdgeTPU Accelerator"},{"key":"ref15","year":"0","journal-title":"EdgeTPU Dev Board"},{"key":"ref16","year":"0","journal-title":"Intel OpenVINO Toolkit"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24390"},{"key":"ref18","first-page":"1","article-title":"X-deepsea: Cross-device deep learning side channel attack","author":"das","year":"0","journal-title":"Proceedings of the 56th Annual Design Automation Conference 2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1051\/itmconf\/20182300037"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2019.8916519"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref6","first-page":"601","article-title":"Stealing machine learning models via prediction apis","author":"tram\u00e8r","year":"0","journal-title":"25th USENIX Security Symposium ( USENIX Security 16)"},{"key":"ref5","article-title":"High accuracy and high fidelity extraction of neural networks","author":"jagielski","year":"0","journal-title":"29th USENIX Security Symposium USENIX Security 20"},{"key":"ref8","first-page":"515","article-title":"CSI NN: reverse engineering of neural network architectures through electromagnetic side channel","author":"batina","year":"2019","journal-title":"28th USENIX Security Symposium USENIX Security 2019"},{"key":"ref7","first-page":"4:1","article-title":"Reverse engineering convolutional neural networks through side-channel information leaks","author":"hua","year":"2018","journal-title":"Proceedings of the 55th Annual Design Automation Conference DAC 2018"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s11633-019-1211-x","article-title":"Adversarial attacks and defenses in images, graphs and text: A review","volume":"17","author":"hao-chen","year":"2020","journal-title":"International Journal of Automation and Computing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134077"},{"key":"ref9","author":"duddu","year":"2018","journal-title":"Stealing Neural Networks via Timing Side Channels"},{"key":"ref20","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"3rd International Conference on Learning Representations ICLR 2015"},{"key":"ref22","article-title":"Security analysis of deep neural networks operating in the presence of cache side-channel attacks","volume":"abs 1810 3487","author":"hong","year":"2018","journal-title":"CoRR"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"}],"event":{"name":"2021 International Conference on Electronics, Information, and Communication (ICEIC)","location":"Jeju, Korea (South)","start":{"date-parts":[[2021,1,31]]},"end":{"date-parts":[[2021,2,3]]}},"container-title":["2021 International Conference on Electronics, Information, and Communication (ICEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9369688\/9369708\/09369754.pdf?arnumber=9369754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:21Z","timestamp":1652197341000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9369754\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,31]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iceic51217.2021.9369754","relation":{},"subject":[],"published":{"date-parts":[[2021,1,31]]}}}