{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:08:24Z","timestamp":1748750904339,"version":"3.41.0"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:00:00Z","timestamp":1745366400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:00:00Z","timestamp":1745366400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2245247"],"award-info":[{"award-number":["2245247"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,23]]},"DOI":"10.1109\/isqed65160.2025.11014341","type":"proceedings-article","created":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T17:43:30Z","timestamp":1748627010000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["REDACTOR: eFPGA Redaction for DNN Accelerator Security"],"prefix":"10.1109","author":[{"given":"Yazan","family":"Baddour","sequence":"first","affiliation":[{"name":"Electrical Engineering, California State Uni. Long Beach,Long Beach,CA,USA"}]},{"given":"Ava","family":"Hedayatipour","sequence":"additional","affiliation":[{"name":"Electrical Engineering, California State Uni. Long Beach,Long Beach,CA,USA"}]},{"given":"Amin","family":"Rezaei","sequence":"additional","affiliation":[{"name":"California State Uni. Long Beach,Computer Engineering &#x0026; Computer Science,Long Beach,CA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102163"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED57927.2023.10129368"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3526241.3530372"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3583781.3590219"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3658617.3697764"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203759"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942049"},{"key":"ref11","first-page":"1","article-title":"Evaluating the security of efpga-based redaction algorithms","volume-title":"2022 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","author":"Rezaei","year":"2022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714924"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HOST54066.2022.9840128"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714856"},{"key":"ref15","first-page":"542","article-title":"Area efficient functional locking through coarse grained runtime reconfigurable architectures","volume-title":"Asia and South Pacific Design Automation Conference (ASP-DAC)","author":"Chen","year":"2021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643548"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9473910"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2017.2698723"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750389"},{"key":"ref21","first-page":"369","article-title":"Pu-diannao: A polyvalent machine learning accelerator","volume-title":"Proceedings International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)","author":"Liu","year":"2015"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.032271057"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080254"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.11"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.40"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/4.121549"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2011.6132691"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.1997.606687"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203770"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359831"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218651"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3282897"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.284"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.193"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2801220"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495588"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"},{"key":"ref38","article-title":"Vulnerability and remedy of stripped function logic locking","author":"Zhou","year":"2019","journal-title":"Cryptology ePrint Archive"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-024-00144-8"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8341984"},{"volume-title":"Yosys open synthesis suite","year":"2013","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2023.3301334"},{"volume-title":"Cnn-accelerator","year":"2021","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2018.2840092"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2020.2995854"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2018.2883923"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1950413.1950457"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2004.824300"},{"article-title":"Bitbucket","volume-title":"bitbucket.org","author":"Shamsi","key":"ref49"}],"event":{"name":"2025 26th International Symposium on Quality Electronic Design (ISQED)","start":{"date-parts":[[2025,4,23]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2025,4,25]]}},"container-title":["2025 26th International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11014297\/11014302\/11014341.pdf?arnumber=11014341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:56:53Z","timestamp":1748667413000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11014341\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,23]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/isqed65160.2025.11014341","relation":{},"subject":[],"published":{"date-parts":[[2025,4,23]]}}}