{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:26:19Z","timestamp":1766298379163},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,20]]},"DOI":"10.1109\/infocom52122.2024.10621088","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:25:41Z","timestamp":1723483541000},"page":"2009-2018","source":"Crossref","is-referenced-by-count":9,"title":["Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices"],"prefix":"10.1109","author":[{"given":"Xueshuo","family":"Xie","sequence":"first","affiliation":[{"name":"Haihe Lab of ITAI,China"}]},{"given":"Haoxu","family":"Wang","sequence":"additional","affiliation":[{"name":"Nankai University,College of Computer Science,China"}]},{"given":"Zhaolong","family":"Jian","sequence":"additional","affiliation":[{"name":"Nankai University,College of Computer Science,China"}]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[{"name":"Nankai University,College of Computer Science,China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University,Beijing Key Laboratory of Security and Privacy in Intelligent Transportation,China"}]},{"given":"Zhiwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Haihe Lab of ITAI,China"}]},{"given":"Guiling","family":"Wang","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23448"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2013.2247460"},{"key":"ref4","first-page":"699","article-title":"{VoltPillager}: Hardware-based fault injection attacks against intel {SGX} enclaves using the {SVID} voltage scaling interface","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Chen"},{"key":"ref5","first-page":"857","article-title":"Sanctum: Minimal hardware extensions for strong software isolation","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Costan"},{"key":"ref6","first-page":"275","article-title":"Scalable memory protection in the {PENGLAI} enclave","volume-title":"15th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 21)","author":"Feng"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132782"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480112"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01410"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484797"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2947124"},{"key":"ref13","first-page":"437","article-title":"{HyperEnclave}: An open and cross-platform trusted execution environment","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Jia"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243837"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops53856.2022.9767528"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345447"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483554"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3313808.3313810"},{"key":"ref20","first-page":"465","article-title":"Design and verification of the arm confidential compute architecture","volume-title":"16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22)","author":"Li"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3472883.3486988"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3187772"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3450268.3453524"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203770"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3472634.3472652"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3456629"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388946"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"article-title":"Darknet: Open source neural networks in c","year":"2013","author":"Redmon","key":"ref29"},{"year":"2016","key":"ref30","article-title":"Internet of things (iot) connected devices installed base worldwide from 2015 to 2025"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403064"},{"article-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware","volume-title":"International Conference on Learning Representations","author":"Tramer","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23068"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS52674.2021.00018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3573942.3573948"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00022"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179474"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918951"}],"event":{"name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","start":{"date-parts":[[2024,5,20]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2024,5,23]]}},"container-title":["IEEE INFOCOM 2024 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10621050\/10621073\/10621088.pdf?arnumber=10621088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T05:23:31Z","timestamp":1723526611000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10621088\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/infocom52122.2024.10621088","relation":{},"subject":[],"published":{"date-parts":[[2024,5,20]]}}}