{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:20:33Z","timestamp":1770276033147,"version":"3.49.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,7]]},"DOI":"10.1109\/isqed51717.2021.9424353","type":"proceedings-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:09:51Z","timestamp":1620691791000},"page":"319-324","source":"Crossref","is-referenced-by-count":8,"title":["Diverse Knowledge Distillation (DKD): A Solution for Improving The Robustness of Ensemble Models Against Adversarial Attacks"],"prefix":"10.1109","author":[{"given":"Ali","family":"Mirzaeian","sequence":"first","affiliation":[]},{"given":"Jana","family":"Kosecka","sequence":"additional","affiliation":[]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[]},{"given":"Tinoosh","family":"Mohsenin","sequence":"additional","affiliation":[]},{"given":"Avesta","family":"Sasan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref32","first-page":"132","article-title":"A comparative study of autoencoders against adversarial attacks","author":"chen","year":"2018","journal-title":"Proc of the Int Conf on Image Processing Computer Vision and Pattern Recognition (IPCV)"},{"key":"ref31","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume":"80","author":"athalye","year":"2018","journal-title":"Proceedings of the 35th International Conf on Machine Learning"},{"key":"ref30","article-title":"Defensive distillation is not robust to adversarial examples","author":"carlini","year":"2016","journal-title":"arXiv preprint arXiv 1607 04311"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102422"},{"key":"ref36","article-title":"Foolbox: A python toolbox to benchmark the robustness of machine learning models","author":"rauber","year":"2017","journal-title":"arXiv preprint arXiv 1707 03374"},{"key":"ref35","first-page":"8024","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"paszke","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref34","author":"krizhevsky","year":"2009","journal-title":"Learning multiple layers of features from tiny images"},{"key":"ref10","article-title":"Eyeriss v2: A flexible and high-performance accelerator for emerging deep neural networks","volume":"abs 1807 7928","author":"chen","year":"2018","journal-title":"CoRR"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref11","article-title":"Tcd-npe: A re-configurable and efficient neural processing engine, powered by novel temporal-carry-deferring macs","author":"mirzaeian","year":"2020","journal-title":"2020 International Conference on ReConFigurable Computing and FPGAs (ReConFig)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3427377"},{"key":"ref13","article-title":"Hardware Architectures for Deep Learning","author":"daneshtalab","year":"2020","journal-title":"Materials Device And Circuits"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS45731.2020.9180836"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116473"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED48828.2020.9137007"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"728","DOI":"10.23919\/DATE.2019.8715080","article-title":"2smart: A two-stage machine learning-based approach for runtime specialized hardware-assisted malware detection","author":"sayadi","year":"2019","journal-title":"2019 Design Automation & Test in Europe Conference & Exhibition (DATE)"},{"key":"ref18","article-title":"Learning assisted side channel delay test for detection of recycled ics","author":"vakil","year":"2021","journal-title":"Asia and South Pacific Design Automation Conf"},{"key":"ref19","article-title":"Intriguing properties of neural networks","volume":"abs 1312 6199","author":"szegedy","year":"2013","journal-title":"Int Conf on Learning Representations"},{"key":"ref28","article-title":"Adversarial training and robustness for multiple perturbations","volume":"abs 1904 13000","author":"tram\u00e8r","year":"2019","journal-title":"ArXiv"},{"key":"ref4","first-page":"265","article-title":"Exploiting energy-accuracy trade-off through contextual awareness in multistage convolutional neural networks","author":"hosseini","year":"2019","journal-title":"Intl Symposium on Quality Electronic Design (ISQED)"},{"key":"ref27","first-page":"78","article-title":"Efficient utilization of adversarial training towards robust machine learners and its analysis","author":"amberkar","year":"2018","journal-title":"Proceedings of the International Conf on Computer-Aided Design"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342068"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317873"},{"key":"ref29","first-page":"582","article-title":"Distillation as a defense to adversarial perturbations against desep neural networks","author":"papernot","year":"2015","journal-title":"2016 IEEE Symposium on Security and Privacy (SP)"},{"key":"ref5","article-title":"Icnn: The iterative convolutional neural network","author":"hosseini","year":"2019","journal-title":"ACM Transactions on Embedded Computing Systems (TECS)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2018.00055"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.28"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref9","article-title":"Nesta: Hamming weight compression-based neural proc. engine","author":"mirzaeian","year":"2020","journal-title":"Proc Asia and South Pacific Design Automation Conference"},{"key":"ref1","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref20","article-title":"Explaining and harnessing adversarial examples","volume":"abs 1412 6572","author":"goodfellow","year":"2014","journal-title":"Int Conf on Learning Representations"},{"key":"ref22","article-title":"Practical black-box attacks against machine learning","author":"papernot","year":"2016","journal-title":"ASIA CCS &#x2019;17"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v32i1.11504","article-title":"Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients","author":"ross","year":"2018","journal-title":"Thirty-Second AAAI Conference on Artificial Intelligence"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED48828.2020.9136987"},{"key":"ref41","article-title":"Interpreting adversarial robustness: A view from decision surface in input space","author":"yu","year":"2018","journal-title":"arXiv preprint arXiv 1810 04805"},{"key":"ref23","article-title":"Adversarial examples that fool both computer vision and time-limited humans","author":"elsayed","year":"2018","journal-title":"NeurIPS"},{"key":"ref44","article-title":"Adversarial machine learning at scale","author":"kurakin","year":"2016","journal-title":"arXiv preprint arXiv 1611 01236"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"ref43","article-title":"Improving adversarial robustness via promoting ensemble diversity","author":"pang","year":"2019","journal-title":"arXiv preprint arXiv 1901 04217"},{"key":"ref25","article-title":"Adversarial examples are not bugs, they are features","volume":"abs 1905 2175","author":"ilyas","year":"2019","journal-title":"ArXiv"}],"event":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","location":"Santa Clara, CA, USA","start":{"date-parts":[[2021,4,7]]},"end":{"date-parts":[[2021,4,9]]}},"container-title":["2021 22nd International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424228\/9424248\/09424353.pdf?arnumber=9424353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T23:22:57Z","timestamp":1672096977000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9424353\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/isqed51717.2021.9424353","relation":{},"subject":[],"published":{"date-parts":[[2021,4,7]]}}}