{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:48:20Z","timestamp":1764175700784,"version":"build-2065373602"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T00:00:00Z","timestamp":1716076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T00:00:00Z","timestamp":1716076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,19]]},"DOI":"10.1109\/iscas58744.2024.10558041","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T17:22:52Z","timestamp":1719940972000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Securing On-Chip Learning: Navigating Vulnerabilities and Potential Safeguards in Spiking Neural Network Architectures"],"prefix":"10.1109","author":[{"given":"Najmeh","family":"Nazari","sequence":"first","affiliation":[{"name":"University of California,Davis"}]},{"given":"Kevin Immanuel","family":"Gubbi","sequence":"additional","affiliation":[{"name":"University of California,Davis"}]},{"given":"Banafsheh Saber","family":"Latibari","sequence":"additional","affiliation":[{"name":"University of California,Davis"}]},{"given":"Muhtasim Alam","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"University of Arizona"}]},{"given":"Chongzhou","family":"Fang","sequence":"additional","affiliation":[{"name":"University of California,Davis"}]},{"given":"Avesta","family":"Sasan","sequence":"additional","affiliation":[{"name":"University of California,Davis"}]},{"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[{"name":"University of California,Davis"}]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[{"name":"University of California,Davis"}]},{"given":"Soheil","family":"Salehi","sequence":"additional","affiliation":[{"name":"University of Arizona"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-96057-5_2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050531"},{"article-title":"Online training of spiking recurrent neural networks with phase-change memory synapses","year":"2021","author":"Demirag","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS46773.2023.10181529"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2019.2903009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.112130359"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3583781.3590316"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247832"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NEWCAS52662.2022.9842256"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9111946"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/s42254-020-0208-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tasc.2024.3359164"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2019.2933719"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-021-01148-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PDP50117.2020.00033"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/brainsci12070863"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.2979826"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.09.036"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1063\/1.5129729"},{"article-title":"Efficient mapping of large scale snn and rate-based dnn on seneca","year":"2023","author":"Nembhani","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207351"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IROS47612.2022.9982181"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3389\/fnano.2021.801999"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207297"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24334"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography7020017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10136984"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref29","first-page":"1689","article-title":"Is feature selection secure against training data poisoning?","volume-title":"international conference on machine learning","author":"Xiao"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3278519"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643524"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ETS56758.2023.10174229"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10136999"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IROS51168.2021.9636718"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2022.937782"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS50862.2020.9095665"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247980"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS46596.2019.8964886"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774711"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-SoC54400.2022.9939654"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530657"},{"key":"ref42","first-page":"85","article-title":"Lockroll: deep-learning power side-channel attack mitigation using emerging reconfigurable devices and logic locking","volume-title":"Proceedings of the 59th ACM\/IEEE DAC","author":"Kolhe"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3579823"}],"event":{"name":"2024 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2024,5,19]]},"location":"Singapore, Singapore","end":{"date-parts":[[2024,5,22]]}},"container-title":["2024 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10557746\/10557828\/10558041.pdf?arnumber=10558041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T06:19:50Z","timestamp":1719987590000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10558041\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,19]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/iscas58744.2024.10558041","relation":{},"subject":[],"published":{"date-parts":[[2024,5,19]]}}}