{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:04:53Z","timestamp":1774551893142,"version":"3.50.1"},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,6]],"date-time":"2023-08-06T00:00:00Z","timestamp":1691280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,6]],"date-time":"2023-08-06T00:00:00Z","timestamp":1691280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1109\/mwscas57524.2023.10406035","type":"proceedings-article","created":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T18:29:15Z","timestamp":1706725755000},"page":"801-805","source":"Crossref","is-referenced-by-count":4,"title":["Bottlenecks in Secure Adoption of Deep Neural Networks in Safety-Critical Applications"],"prefix":"10.1109","author":[{"given":"Sanjay","family":"Das","sequence":"first","affiliation":[{"name":"University of Texas at Dallas,Electrical and Computer Engineering,Richardson,TX,USA"}]},{"given":"Shamik","family":"Kundu","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas,Electrical and Computer Engineering,Richardson,TX,USA"}]},{"given":"Kanad","family":"Basu","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas,Electrical and Computer Engineering,Richardson,TX,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2616357"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2020.9126102"},{"key":"ref4","article-title":"Special session: Reliability analysis for ml\/ai hard-ware","author":"Kundu","year":"2021","journal-title":"arXiv preprint"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.59"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2015.2491263"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2734685"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2021.3116999"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IPFA47161.2019.8984845"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2947757"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00130"},{"key":"ref12","article-title":"Explaining and harnessing adversarial exam-ples","author":"Goodfellow","year":"2014","journal-title":"arXiv preprint"},{"key":"ref13","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv preprint"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref17","first-page":"1802","article-title":"Exploring the landscape of spatial robustness","volume-title":"International conference on machine learning","author":"Engstrom"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref19","article-title":"Poisoning attacks against support vector machines","author":"Biggio","year":"2012","journal-title":"arXiv preprint"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2915318"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31271-2_12"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3112932"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1145\/3400302.3415726","article-title":"Concurrent weight encoding-based detection for bit- flip attack on neural network accelerators","volume-title":"IEEEIACM International Conference on Computer-Aided Design (ICC AD), 2020","author":"Liu","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643556"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423338"},{"key":"ref27","article-title":"A survey on uncertainty quantification methods for deep neural networks: An uncertainty source perspective","author":"He","year":"2023","journal-title":"arXiv preprint"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10562-9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-021-05946-3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2022.3155327"},{"key":"ref31","article-title":"Practical variational inference for neural networks","volume-title":"NeurIPS Proceedings","author":"Graves","year":"2011"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1992.4.3.448"},{"key":"ref33","first-page":"1050","article-title":"Dropout as a bayesian approximation: Representing model uncertainty in deep learning","volume-title":"international conference on machine learning","author":"Gal"},{"key":"ref34","article-title":"Simple and scalable predictive uncertainty estimation using deep ensembles","volume":"30","author":"Lakshminarayanan","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref35","first-page":"370","article-title":"Deep kernel learning","volume-title":"Artificial intelligence and statistics","author":"Wilson"},{"key":"ref36","first-page":"7498","article-title":"Simple and principled uncertainty estimation with de-terministic deep learning via distance awareness","volume":"33","author":"Liu","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295309"},{"key":"ref38","first-page":"4075","article-title":"High-quality prediction intervals for deep learning: A distribution-free, ensembled approach","volume-title":"International conference on machine learning","author":"Pearce"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.48161\/qaj.v1n2a50"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39964-3_62"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00575"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcp.2022.111270"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201817601033"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1080\/24754269.2021.1980261"},{"key":"ref45","article-title":"Interpretml: A unified framework for machine learning interpretability","author":"Nori","year":"2019","journal-title":"arXiv preprint"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-020-09270-8"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.3030354"},{"key":"ref48","article-title":"why should i trust you","author":"Ribeiro","year":"2016","journal-title":"ACM SIGKDD"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-53352-6_24"},{"key":"ref50","article-title":"Grad-cam: Why did you say that?","author":"Selvaraju","year":"2016","journal-title":"arXiv preprint"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9415064"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0679-x"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113941"},{"key":"ref54","article-title":"Fast treeshap: Accelerating shap value computation for trees","author":"Yang","year":"2021","journal-title":"arXiv preprint"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3321\/j.issn:0529-6579.2007.z1.029"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30115-8_34"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2021.103457"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314230"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1080\/10618600.2014.907095"},{"key":"ref60","article-title":"Explanations based on the missing: Towards contrastive explanations with pertinent negatives","volume":"31","author":"Dhurandhar","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11491"}],"event":{"name":"2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS)","location":"Tempe, AZ, USA","start":{"date-parts":[[2023,8,6]]},"end":{"date-parts":[[2023,8,9]]}},"container-title":["2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10405424\/10405847\/10406035.pdf?arnumber=10406035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T23:57:14Z","timestamp":1706831834000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10406035\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,6]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/mwscas57524.2023.10406035","relation":{},"subject":[],"published":{"date-parts":[[2023,8,6]]}}}