{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:10:34Z","timestamp":1767773434990,"version":"3.37.3"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2020AAA0107700"],"award-info":[{"award-number":["2020AAA0107700"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62227805","62072398"],"award-info":[{"award-number":["62227805","62072398"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SUTDZJU IDEA Grant for visiting professors","award":["SUTD-ZJUVP201901"],"award-info":[{"award-number":["SUTD-ZJUVP201901"]}]},{"name":"National Key Laboratory of Science and Technology on Information System Security","award":["6142111210301"],"award-info":[{"award-number":["6142111210301"]}]},{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing"},{"name":"Key Laboratory of Cyberspace Situation Awareness of Henan Province","award":["HNTS2022001"],"award-info":[{"award-number":["HNTS2022001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1109\/tcad.2024.3426364","type":"journal-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T17:31:03Z","timestamp":1720632663000},"page":"39-51","source":"Crossref","is-referenced-by-count":3,"title":["A Deep Investigation on Stealthy DVFS Fault Injection Attacks at DNN Hardware Accelerators"],"prefix":"10.1109","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0401-3135","authenticated-orcid":false,"given":"Junge","family":"Xu","sequence":"first","affiliation":[{"name":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6087-8243","authenticated-orcid":false,"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"given":"Wenguang","family":"Jin","sequence":"additional","affiliation":[{"name":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5172-9129","authenticated-orcid":false,"given":"Kun","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8550-9241","authenticated-orcid":false,"given":"Zeke","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6014-6453","authenticated-orcid":false,"given":"Weixiong","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4244-5916","authenticated-orcid":false,"given":"Yajun","family":"Ha","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.glohj.2019.07.001"},{"key":"ref2","first-page":"290","article-title":"A 7.663-TOPS 8.2-W energy-efficient FPGA accelerator for binary convolutional neural networks","volume-title":"Proc. FPGA \u201817","author":"Li"},{"key":"ref3","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref4","article-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2016","journal-title":"arXiv:1611.01236"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_13"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853210"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3278519"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218577"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530516"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_17"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1088\/1674-4926\/41\/2\/022406"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref14","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2616357"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2705069"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2808319"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2847263.2847276"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2636225"},{"volume-title":"DPU for Convolutional Neural Network v1.2","year":"2019","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2018.2815603"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203770"},{"key":"ref26","first-page":"497","article-title":"Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks","volume-title":"Proc. 28th USENIX Conf. Secur. Symp.","author":"Hong"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2019.00015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586262"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2018.00055"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530494"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2017.4241350"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8351685"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218690"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST47458.2019.9006701"},{"volume-title":"Zynq UltraScale+ MPSoC Data Sheet: DC and AC Switching Characteristics v1.21","year":"2022","key":"ref35"},{"volume-title":"Deep Neural Network Development Kit V3.0","year":"2019","key":"ref36"},{"key":"ref37","article-title":"Skynet: A champion model for DAC-SDC on low power object detection","author":"Zhang","year":"2019","journal-title":"arXiv:1906.10327"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955004"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423338"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/43\/10814105\/10591998.pdf?arnumber=10591998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T06:17:56Z","timestamp":1735107476000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10591998\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":40,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2024.3426364","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2025,1]]}}}