{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T06:14:02Z","timestamp":1775628842424,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00009","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"17-24","source":"Crossref","is-referenced-by-count":0,"title":["Fault Robustness and Lightweight Error Correction for Low-Precision Posit Neural Networks in Safety-Critical Systems"],"prefix":"10.1109","author":[{"given":"Suleiman Junaidu","family":"Sadiq","sequence":"first","affiliation":[{"name":"University of Reading,Department of Computer Science,UK"}]},{"given":"Martin Mariusz","family":"Lester","sequence":"additional","affiliation":[{"name":"University of Reading,Department of Computer Science,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14529\/jsfi170206"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/dasc.2016.7778055"},{"issue":"3","key":"ref3","first-page":"4","article-title":"The Boeing 737 MAX saga: Lessons for software organizations","volume":"21","author":"Johnston","year":"2019","journal-title":"Software Quality Professional"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/metrocad48866.2020.00010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9255-3_5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-020-00945-9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3636551"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482029"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.44-68"},{"key":"ref10","first-page":"699","article-title":"VoltPillager: Hardware-based fault injection attacks against Intel SGX enclaves using the SVID voltage scaling interface","volume-title":"Proc. 30th USENIX Security Symp. (USENIX Security 21)","author":"Chen"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2020.2971217"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2003.813129"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715262"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00130"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12040853"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1147\/rd.62.0200"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00047"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S58398.2023.00025"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474081"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ITC51657.2024.00029"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2742698"},{"key":"ref23","first-page":"1","article-title":"Understanding error propagation in deep learning neural network (DNN) accelerators and applications","volume-title":"Proc. Int. Conf. for High Performance Computing, Networking, Storage and Analysis (SC)","author":"Li"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001165"},{"key":"ref25","article-title":"Evaluating robustness of neural networks with mixed integer programming","author":"Tjeng","year":"2017"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00058"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/2331986"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.020413.122463"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2007.40"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3278519"},{"key":"ref31","first-page":"593","article-title":"Retraining-based timing error mitigation for hardware neural networks","volume-title":"Proc. Design, Automation and Test in Europe Conf. (DATE)","author":"Deng"},{"issue":"10","key":"ref32","first-page":"21","article-title":"Methods for formal verification of artificial neural networks: A review of existing approaches","volume":"10","author":"Stroeva","year":"2022","journal-title":"Int. J. Open Inf. Technol."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2020.102762"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471526.pdf?arnumber=11471526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:38:28Z","timestamp":1775626708000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471526\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00009","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}