{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:19:28Z","timestamp":1769728768680,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100020770","name":"NYUAD Research Institute","doi-asserted-by":"publisher","award":["G1104,CG010"],"award-info":[{"award-number":["G1104,CG010"]}],"id":[{"id":"10.13039\/100020770","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,7]]},"DOI":"10.1109\/iolts65288.2025.11116950","type":"proceedings-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T18:07:28Z","timestamp":1755626848000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Neuromorphic Computing for Embodied Intelligence in Autonomous Systems: Current Trends, Challenges, and Future Directions"],"prefix":"10.1109","author":[{"given":"Alberto","family":"Marchisio","sequence":"first","affiliation":[{"name":"New York University Abu Dhabi (NYUAD),eBRAIN Lab, Division of Engineering,Abu Dhabi,UAE"}]},{"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi (NYUAD),eBRAIN Lab, Division of Engineering,Abu Dhabi,UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533738"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IROS47612.2022.9981034"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-39932-9_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV63323.2024.10821619"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(97)00011-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2474396"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SiPS52927.2021.00053"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2022.795876"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1088\/2634-4386\/ad1cd7"},{"key":"ref10","article-title":"A 128x128 120 db 15us latency asynchronous temporal contrast vision sensor","author":"Lichtsteiner","year":"2008","journal-title":"IEEE JSSC"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.781"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2016.2574707"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00186"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref15","article-title":"Snn-rat: Robustness-enhanced spiking neural network through regularized adversarial training","author":"Ding","year":"2022","journal-title":"NeurIPS"},{"key":"ref16","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012","journal-title":"Cryptology ePrint Archive"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/info14100537"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9473981"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IROS47612.2022.9982181"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2024.1401677"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV63323.2024.10821701"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV63323.2024.10821503"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IROS51168.2021.9636718"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn55064.2022.9892948"},{"key":"ref25","article-title":"Implementing spiking neural networks on neuromorphic architectures: A review","author":"Huynh","year":"2022","journal-title":"arXiv preprint"},{"key":"ref26","article-title":"Data poisoning-based backdoor attack framework against supervised learning rules of spiking neural networks","author":"Jin","year":"2024","journal-title":"arXiv preprint"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-025-57352-1"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-024-08253-8"}],"event":{"name":"2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS)","location":"Ischia, Italy","start":{"date-parts":[[2025,7,7]]},"end":{"date-parts":[[2025,7,9]]}},"container-title":["2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11115077\/11116814\/11116950.pdf?arnumber=11116950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T06:23:04Z","timestamp":1755670984000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11116950\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iolts65288.2025.11116950","relation":{},"subject":[],"published":{"date-parts":[[2025,7,7]]}}}