{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:41:34Z","timestamp":1764175294428,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892545","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"01-10","source":"Crossref","is-referenced-by-count":6,"title":["NeuroUnlock: Unlocking the Architecture of Obfuscated Deep Neural Networks"],"prefix":"10.1109","author":[{"given":"Mahya Morid","family":"Ahmadi","sequence":"first","affiliation":[{"name":"Technische Universitat Wien (TU Wien),Vienna,Austria"}]},{"given":"Lilas","family":"Alrahis","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi (NYUAD),Division of Engineering,Abu Dhabi,United Arab Emirates"}]},{"given":"Alessio","family":"Colucci","sequence":"additional","affiliation":[{"name":"Technische Universitat Wien (TU Wien),Vienna,Austria"}]},{"given":"Ozgur","family":"Sinanoglu","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi (NYUAD),Division of Engineering,Abu Dhabi,United Arab Emirates"}]},{"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi (NYUAD),Division of Engineering,Abu Dhabi,United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3394885.3431639"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694385"},{"key":"ref12","first-page":"1345","article-title":"High accuracy and high fidelity extraction of neural networks","author":"jagielski","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833743"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00238"},{"key":"ref16","first-page":"578","article-title":"TVM: An automated end-to-end optimizing compiler for deep learning","author":"chen","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00359"},{"key":"ref18","first-page":"541","volume":"1","author":"lecun","year":"0","journal-title":"Backpropagation Applied to Handwritten Zip Code Recognition"},{"journal-title":"Nvidia nsight systems","year":"2022","key":"ref19"},{"journal-title":"huyvnphan\/PyTorch_cifarI0","year":"2021","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12028"},{"key":"ref27","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"0","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref3","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume":"25","author":"krizhevsky","year":"2012","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378460"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300259"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_11"},{"journal-title":"Autopilot","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HOST49136.2021.9702279"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2015.133"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-4012"},{"key":"ref22","first-page":"8024","article-title":"Pytorch: An imperative style, high-performance deep learning library","author":"paszke","year":"2019","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref21","article-title":"Improving black-box adversarial attacks with a transfer-based prior","author":"cheng","year":"0","journal-title":"Proceedings of the 33rd International Conference on Neural Information Processing Systems (NIPS)"},{"journal-title":"Learning multiple layers of features from tiny images","year":"2009","author":"krizhevsky","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729586"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"key":"ref25","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"0","journal-title":"International Conference on Learning Representations (ICLR)"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2022,7,18]]},"location":"Padua, Italy","end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892545.pdf?arnumber=9892545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:58:24Z","timestamp":1667516304000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892545","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}