{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:23:00Z","timestamp":1763202180911,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/iolts.2018.8474192","type":"proceedings-article","created":{"date-parts":[[2018,10,23]],"date-time":"2018-10-23T00:31:36Z","timestamp":1540254696000},"page":"257-260","source":"Crossref","is-referenced-by-count":62,"title":["Robust Machine Learning Systems: Reliability and Security for Deep Neural Networks"],"prefix":"10.1109","author":[{"given":"Muhammad Abdullah","family":"Hanif","sequence":"first","affiliation":[]},{"given":"Faiq","family":"Khalid","sequence":"additional","affiliation":[]},{"given":"Rachmad Vidya Wicaksana","family":"Putra","sequence":"additional","affiliation":[]},{"given":"Semeen","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Outsourced privacy-preserving classification service over encrypted data","author":"li","year":"2018","journal-title":"Journal of Network and Computer Applications"},{"year":"2018","author":"lecun","key":"ref38"},{"key":"ref33","article-title":"Chiron: Privacy-preserving Machine Learning as a Service","author":"hunt","year":"2018","journal-title":"preprint arXiv 1803 05961"},{"key":"ref32","article-title":"Safety verification of deep neural networks","author":"huan","year":"2017","journal-title":"CAV"},{"key":"ref31","article-title":"Deepsafe: A data-driven approach for checking adversarial robustness in neural networks","author":"gopinath","year":"2017","journal-title":"preprint arXiv 1710 00486"},{"key":"ref30","first-page":"1","article-title":"ASER: Adaptive soft error resilience for reliability-heterogeneous processors in the dark silicon era","author":"kriebel","year":"2014","journal-title":"IEEE DAC"},{"key":"ref37","first-page":"20","article-title":"LeNet-5, convolutional neural networks","author":"lecun","year":"2015"},{"key":"ref36","first-page":"91","article-title":"DeepAPT: nation-state APT attribution using end-to-end deep neural networks","author":"rosenberg","year":"2017","journal-title":"ICANN"},{"key":"ref35","article-title":"Natural and Effective Obfuscation by Head Inpainting","author":"sun","year":"2017","journal-title":"preprint arXiv 1711 09001"},{"key":"ref34","article-title":"I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators","author":"wei","year":"2018","journal-title":"preprint arXiv 1803 05847"},{"key":"ref10","article-title":"NBTI induced performance degradation in logic and memory circuits: how effectively can we approach a reliability solution?","author":"kang","year":"2008","journal-title":"ASPDAC"},{"key":"ref40","article-title":"Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery","author":"liu","year":"2018","journal-title":"IEEE TCC"},{"key":"ref11","first-page":"2776","article-title":"Reliability-aware synthesis of combinational logic with minimal performance penalty","volume":"60 4","author":"limbrick","year":"2013","journal-title":"IEEE TNS"},{"key":"ref12","article-title":"Analyzing and Mitigating the Impact of Permanent Faults on a Systolic Array Based Neural Network Accelerator","author":"gu","year":"2018","journal-title":"preprint arXiv 1802 04657"},{"key":"ref13","article-title":"ThUnderVolt: Enabling Aggressive Voltage Underscaling and Timing Error Resilience for Energy Efficient Deep Neural Network Accelerators","author":"zhang","year":"2018","journal-title":"IEEE DAC"},{"key":"ref14","first-page":"827","article-title":"An overview of next-generation architectures for machine learning: Roadmap, opportunities and challenges in the IoT era","author":"shafique","year":"2018","journal-title":"IEEE DATE"},{"key":"ref15","article-title":"Towards the science of security and privacy in machine learning","author":"papernot","year":"2016","journal-title":"preprint arXiv 1611 03814"},{"key":"ref16","article-title":"PANDA: Facilitating Usable AI Development","author":"gao","year":"2018","journal-title":"preprint arXiv 1804 09997"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0024"},{"key":"ref18","article-title":"CryptoDL: Deep Neural Networks over Encrypted Data","author":"hesamifard","year":"2017","journal-title":"preprint arXiv 1711 05189"},{"key":"ref19","first-page":"1","article-title":"Supervised machine learning using encrypted training data","author":"gonz\u00e1lez-serrano","year":"2017","journal-title":"International Journal of Information Security"},{"key":"ref28","article-title":"Error resilience analysis for systematically employing approximate computing in convolutional neural networks","author":"hanif","year":"2018","journal-title":"IEEE DATE"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2005.110"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080254"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDMR.2005.853449"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1147\/rd.62.0200","article-title":"The use of triple-modular redundancy to improve computer reliability","author":"lyons","year":"1962","journal-title":"IBM J Res Develop 2"},{"key":"ref29","first-page":"1","article-title":"Exploiting program-level masking and error propagation for constrained reliability optimization","author":"shafique","year":"2013","journal-title":"IEEE DAC"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2010.5457242"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2008.2007145"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.85"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1038\/529445a","article-title":"Google AI algorithm masters ancient game of Go","volume":"529","author":"gibney","year":"2016","journal-title":"Nature News"},{"article-title":"Reliable Software for Unreliable Hardware &#x2013; A Cross-Layer Approach","year":"2015","author":"rehman","key":"ref9"},{"key":"ref1","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"NIPS"},{"key":"ref20","article-title":"Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks","author":"liu","year":"2018","journal-title":"preprint arXiv 1801 02850"},{"key":"ref22","first-page":"97","article-title":"Reluplex: An efficient SMT solver for verifying deep neural networks","author":"katz","year":"2017","journal-title":"CAV"},{"key":"ref21","article-title":"Certified defenses for data poisoning attacks","author":"steinhardt","year":"2017","journal-title":"NIPS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref23","article-title":"Toward Scalable Verification for Safety-Critical Deep Networks","author":"kuper","year":"2018","journal-title":"preprint arXiv 1801 05950"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2807412"}],"event":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","start":{"date-parts":[[2018,7,2]]},"location":"Platja d'Aro","end":{"date-parts":[[2018,7,4]]}},"container-title":["2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8450543\/8474071\/08474192.pdf?arnumber=8474192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:37:16Z","timestamp":1598229436000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8474192\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/iolts.2018.8474192","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}