{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:02:51Z","timestamp":1764842571889,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647763","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-10","source":"Crossref","is-referenced-by-count":4,"title":["Deterministic and Statistical Strategies to Protect ANNs against Fault Injection Attacks"],"prefix":"10.1109","author":[{"given":"Troya Cagil","family":"Koylu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cezar Rodolfo Wedig","family":"Reinbrecht","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Said","family":"Hamdioui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mottaqiallah","family":"Taouil","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"year":"2021","journal-title":"Xilinx virtex-7 FPGA vc707 Evaluation Kit","key":"ref39"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/2684746.2689060"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ISCAS45731.2020.9180476"},{"key":"ref32","volume":"17","author":"bushnell","year":"2004","journal-title":"Essentials of Electronic Testing for Digital Memory and Mixed-Signal VLSI Circuits"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/3126908.3126964"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/3243734.3278519"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1145\/2647868.2654889"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1007\/s11263-015-0816-y"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/CVPR.2015.7298594"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.5244\/C.28.6"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TITS.2017.2665968"},{"key":"ref40","article-title":"End to end learning for self-driving cars","author":"bojarski","year":"2016","journal-title":"arXiv preprint arXiv 1604 07316"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/IFITA.2010.304"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2678373.2665726"},{"year":"1991","author":"bolt","journal-title":"Investigating Fault Tolerance in Artificial Neural Networks","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ATS.1997.643927"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/s13238-016-0302-5"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/S0893-6080(98)00094-X"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.neucom.2010.09.025"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1002\/scj.4690250204"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/3061639.3062248"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/978-1-4020-6488-3_31"},{"key":"ref4","first-page":"1","article-title":"A survey of machine learning for big data processing","volume":"2016","author":"qiu","year":"2016","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1147\/rd.62.0200"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ASRU.2015.7404790"},{"year":"2015","author":"miller","journal-title":"Remote exploitation of an unaltered passenger vehicle","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/IVS.2017.7995703"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ICCAD.2017.8203770"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ISCAS45731.2020.9180708"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TR.2018.2878387"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3065386"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/DSN-W.2017.47"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/BF02478259"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/72.105414"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3195970.3195997"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.neucom.2008.05.009"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/LATW.2019.8704548"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/72.248456"},{"year":"2020","author":"gillela","journal-title":"Design of hardware cnn accelerators for audio and image classification","key":"ref41"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/BF00452996"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.23919\/DATE48585.2020.9116571"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","article-title":"The sorcerer&#x2019;s apprentice guide to fault attacks","volume":"94","author":"bar-el","year":"2006","journal-title":"Proceedings of the IEEE"},{"key":"ref43","article-title":"Empirical evaluation of rectified activations in convolutional network","author":"xu","year":"2015","journal-title":"arXiv preprint arXiv 1505 00853"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/72.363479"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647763.pdf?arnumber=9647763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:51Z","timestamp":1652201991000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647763","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}