{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:02:31Z","timestamp":1774717351665,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T00:00:00Z","timestamp":1751760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T00:00:00Z","timestamp":1751760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,6]]},"DOI":"10.1109\/isvlsi65124.2025.11130213","type":"proceedings-article","created":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T18:20:15Z","timestamp":1756318815000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Optimization and Security of AI Models for Deployment at Edge: A Comprehensive Review"],"prefix":"10.1109","author":[{"given":"Hafizur","family":"Rahaman","sequence":"first","affiliation":[{"name":"Indian Institute of Engineering Science and Tecnology Shibpur"}]},{"given":"Chandan","family":"Giri","sequence":"additional","affiliation":[{"name":"Indian Institute of Engineering Science and Tecnology Shibpur"}]},{"given":"Surajit K","family":"Roy","sequence":"additional","affiliation":[{"name":"Indian Institute of Engineering Science and Tecnology Shibpur"}]},{"given":"Amlan","family":"Chakrabarti","sequence":"additional","affiliation":[{"name":"University of Calcutta"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100674"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5220\/0012855200003764"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3007787"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3038040"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14748-7_2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.04.141"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/JCIN.2022.9815195"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref9","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ATS64447.2024.10915428"},{"key":"ref11","article-title":"Dnn-alias: Deep neural network protection against side-channel attacks via layer balancing","author":"Ahmadi","year":"2023","journal-title":"arXiv:2303.06746"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ATS64447.2024.10915409"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA-C65153.2025.00081"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-78239-z"},{"key":"ref15","article-title":"Edge ai-based radio frequency fingerprinting for iot networks","author":"Hussain","year":"2024","journal-title":"arXiv:2412.10553"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3406479"},{"key":"ref17","article-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","author":"Howard","year":"2017","journal-title":"arXiv:1704.04861"},{"key":"ref18","article-title":"Squeezenet: Alexnet-level accuracy with 50x fewer parameters and _i 0.5 mb model size","author":"Iandola","year":"2016","journal-title":"arXiv:1602.07360"},{"key":"ref19","first-page":"800","article-title":"Tensorflow lite micro: Embedded machine learning for tinyml systems","volume-title":"Proceedings of Machine Learning and Systems","volume":"3","author":"David"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3524500"},{"key":"ref21","first-page":"7979","article-title":"Hardcore-nas: Hard constrained differentiable neural architecture search","volume-title":"International Conference on Machine Learning","author":"Nayman"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3376548"},{"key":"ref23","article-title":"On accelerating edge ai: Optimizing resource-constrained environments","author":"Sander","year":"2025","journal-title":"arXiv:2501.15014"},{"key":"ref24","article-title":"Multi-component optimization and efficient deployment of neural-networks on resource-constrained iot hardware","author":"Sudharsan","year":"2022","journal-title":"arXiv:2204.10183"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00286"},{"key":"ref26","article-title":"Optimizing edge ai: A comprehensive survey on data, model, and system strategies","author":"Wang","year":"2025","journal-title":"arXiv:2501.03265"},{"key":"ref27","first-page":"25566","article-title":"Shiftaddnas: Hardwareinspired search for more accurate and efficient neural networks","volume-title":"International Conference on Machine Learning","author":"You"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01453-z"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3575798"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/info13060279"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11081283"},{"key":"ref32","article-title":"Tinyml security: Exploring vulnerabilities in resourceconstrained machine learning systems","author":"Huckelberry","year":"2024","journal-title":"arXiv:2411.07114"},{"key":"ref33","first-page":"2329","article-title":"Aegis: Mitigating targeted bit-flip attacks against deep neural networks","volume-title":"32nd USENIX Security Symposium","author":"Wang"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/s24020590"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/fi13110272"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3154605"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.127663"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E61754.2024.00026"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643539"}],"event":{"name":"2025 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","location":"Kalamata, Greece","start":{"date-parts":[[2025,7,6]]},"end":{"date-parts":[[2025,7,9]]}},"container-title":["2025 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129697\/11130193\/11130213.pdf?arnumber=11130213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T04:31:04Z","timestamp":1756355464000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,6]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/isvlsi65124.2025.11130213","relation":{},"subject":[],"published":{"date-parts":[[2025,7,6]]}}}