{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T05:52:39Z","timestamp":1726206759151},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/mwscas48704.2020.9184684","type":"proceedings-article","created":{"date-parts":[[2020,9,2]],"date-time":"2020-09-02T20:53:58Z","timestamp":1599080038000},"page":"945-948","source":"Crossref","is-referenced-by-count":2,"title":["Can Hardware Performance Counters Detect Adversarial Inputs?"],"prefix":"10.1109","author":[{"given":"Preet","family":"Derasari","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Siva","family":"Koppineedi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guru","family":"Venkataramani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"article-title":"Towards deep learning models resistant to adversarial attacks","year":"2017","author":"madry","key":"ref10"},{"article-title":"Defense-gan: Protecting classifiers against adversarial attacks using generative models","year":"2018","author":"samangouei","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"article-title":"Ensemble adversarial training: Attacks and defenses","year":"2017","author":"tram\u00e8r","key":"ref13"},{"article-title":"Provable defenses against adversarial examples via the convex outer adversarial polytope","year":"2017","author":"wong","key":"ref14"},{"article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","year":"2017","author":"xu","key":"ref15"},{"article-title":"Adversarial attacks against medical deep learning systems","year":"2018","author":"finlayson","key":"ref4"},{"key":"ref3","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"12th USENIX Symposium on Operating Systems Design and Implementation ( OSDI 16)"},{"article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","year":"2017","author":"gu","key":"ref6"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"goodfellow","key":"ref5"},{"article-title":"Skin lesion analysis toward melanoma detection: A challenge at the international symposium on biomedical imaging (isbi) 2016, hosted by the international skin imaging collaboration (isic)","year":"2016","author":"gutman","key":"ref8"},{"article-title":"Countering adversarial images using input transformations","year":"2017","author":"guo","key":"ref7"},{"year":"0","key":"ref2","article-title":"perf: Linux profiling with performance counters"},{"year":"0","key":"ref1","article-title":"Intel&#x00AE; microarchitecture code named skylake events"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"krizhevsky","key":"ref9"}],"event":{"name":"2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS)","start":{"date-parts":[[2020,8,9]]},"location":"Springfield, MA, USA","end":{"date-parts":[[2020,8,12]]}},"container-title":["2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9178719\/9184428\/09184684.pdf?arnumber=9184684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:56:11Z","timestamp":1656453371000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9184684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/mwscas48704.2020.9184684","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}