{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T12:00:05Z","timestamp":1768910405426,"version":"3.49.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"National Science Foundation","award":["1953801"],"award-info":[{"award-number":["1953801"]}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-23-1-0073"],"award-info":[{"award-number":["W911NF-23-1-0073"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000142412507"],"award-info":[{"award-number":["N000142412507"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Circuits Syst."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcas.2025.3602678","type":"journal-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:24:46Z","timestamp":1756236286000},"page":"383-392","source":"Crossref","is-referenced-by-count":0,"title":["Improving Neural Network Fault Tolerance Against Weight Attack"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0426-7848","authenticated-orcid":false,"given":"Chia Jen","family":"Cheng","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering Department, Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9532-3395","authenticated-orcid":false,"given":"Ethan","family":"Chen","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4190-6370","authenticated-orcid":false,"given":"Vanessa","family":"Chen","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21918"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.media.2017.07.005","article-title":"A survey on deep learning in medical image analysis","volume":"42","author":"Litjens","year":"2017","journal-title":"Med. Image Anal."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.jmsy.2018.01.003","article-title":"Deep learning for smart manufacturing: Methods and applications","volume":"48","author":"Wang","year":"2018","journal-title":"J. Manuf. Syst."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2012.13"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS55811.2022.00032"},{"key":"ref6","first-page":"449","article-title":"Security of neural networks from hardware perspective: A survey and beyond","volume-title":"Proc. 26th Asia South Pac. Design Autom. Conf","author":"Xu"},{"key":"ref7","first-page":"497","article-title":"Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Secur.)","author":"Hong"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465834"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1147\/rd.62.0200"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.16"},{"key":"ref11","first-page":"1","article-title":"Lossy image compression with compressive autoencoders","volume-title":"Proc. Int. Conf. Learn. Represent","author":"Theis"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2019.00713"},{"key":"ref13","first-page":"1","article-title":"End-to-end optimized image compression","volume-title":"Proc. Int. Conf. Learn. Represent","author":"Ball\u00e9"},{"key":"ref14","first-page":"593","article-title":"Retraining-based timing error mitigation for hardware neural networks","volume-title":"Proc. Design, Autom. Test Europe Conf. Exhibit.","author":"Deng"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DFT52944.2021.9568363"},{"key":"ref16","article-title":"In-place zero-space memory protection for CNN","volume-title":"Advances in Neural Information Processing System","volume":"32","author":"Guan","year":"2019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476184"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2024.3374638"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474113"},{"key":"ref20","article-title":"Robustness of neural networks against storage media errors","author":"Qin","year":"2017","journal-title":"arXiv:1709.06173"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589063"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2019.2915318"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-53140-2_29","article-title":"Curious case of rowhammer: Flipping secret exponent bits using timing analysis","volume-title":"Cryptol. ePrint Arch.","author":"Bhattacharya","year":"2016"},{"key":"ref24","first-page":"1","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Goodfellow"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref27","first-page":"598","article-title":"Optimal brain damage","volume-title":"Proc. 3rd Int. Conf. Neural Inf. Process. Syst","author":"Le Cun"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1503.02531"},{"key":"ref29","article-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and Huffman coding","author":"Han","year":"2016","journal-title":"arXiv:1510.00149"},{"key":"ref30","article-title":"Scalable model compression by entropy penalized reparameterization","author":"Oktay","year":"2020","journal-title":"arXiv:1906.06624"},{"key":"ref31","first-page":"1","article-title":"Variational Autoencoder for low bit-rate image compression","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR) Workshops","author":"Zhou"},{"key":"ref32","article-title":"Estimating or propagating gradients through stochastic neurons for conditional computation","author":"Bengio","year":"2013","journal-title":"arXiv:1308.3432"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01609"},{"key":"ref34","article-title":"Optimizing the communication-accuracy trade-off in federated learning with rate-distortion theory","author":"Mitchell","year":"2022","journal-title":"arXiv:2201.02664"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref36","article-title":"MobileNetV2: Inverted residuals and linear bottlenecks","author":"Sandler","year":"2019","journal-title":"arXiv:1801.04381"},{"key":"ref37","article-title":"Learning multiple layers of features from tiny images","volume-title":"Dept. Comput. Sci.","author":"Krizhevsky","year":"2009"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/VTS60656.2024.10538886"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2024.3386328"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/A-SSCC56115.2022.9980666"}],"container-title":["IEEE Open Journal of Circuits and Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8784029\/10830546\/11142271-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8784029\/10830546\/11142271.pdf?arnumber=11142271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T20:57:32Z","timestamp":1768856252000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11142271\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/ojcas.2025.3602678","relation":{},"ISSN":["2644-1225"],"issn-type":[{"value":"2644-1225","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}