{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T21:48:48Z","timestamp":1767304128931,"version":"3.37.3"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972145","61932010","62102139"],"award-info":[{"award-number":["61972145","61932010","62102139"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004761","name":"Natural Science Foundation of Hainan Province","doi-asserted-by":"publisher","award":["2022JJ30168","2023JJ20015"],"award-info":[{"award-number":["2022JJ30168","2023JJ20015"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tii.2024.3438284","type":"journal-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T19:10:38Z","timestamp":1724353838000},"page":"14017-14028","source":"Crossref","is-referenced-by-count":3,"title":["FPGA Adaptive Neural Network Quantization for Adversarial Image Attack Defense"],"prefix":"10.1109","volume":"20","author":[{"given":"Yufeng","family":"Lu","sequence":"first","affiliation":[{"name":"National Engineering Research Center for Robot Visual Perception and Control Technology, and the College of Electrical and Information Engineering, Hunan University, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7983-8381","authenticated-orcid":false,"given":"Xiaokang","family":"Shi","sequence":"additional","affiliation":[{"name":"College of Electrical and Information Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3029-8146","authenticated-orcid":false,"given":"Jianan","family":"Jiang","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Robot Visual Perception and Control Technology, and the School of Robotics, Hunan University, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2091-5163","authenticated-orcid":false,"given":"Hanhui","family":"Deng","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Robot Visual Perception and Control Technology, and the School of Robotics, Hunan University, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8754-4355","authenticated-orcid":false,"given":"Yanwen","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Electrical and Information Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7563-5698","authenticated-orcid":false,"given":"Jiwu","family":"Lu","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Robot Visual Perception and Control Technology, and the College of Electrical and Information Engineering, Hunan University, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8697-1817","authenticated-orcid":false,"given":"Di","family":"Wu","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Robot Visual Perception and Control Technology, and the School of Robotics, Hunan University, Changsha, Hunan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2852335"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2616357"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i19.30090"},{"key":"ref4","first-page":"3123","article-title":"BinaryConnect: Training deep neural networks with binary weights during propagations","volume-title":"Proc. Int. Conf. Adv. Neural Inf. Process. Syst.","volume":"28","author":"Courbariaux","year":"2015"},{"key":"ref5","first-page":"7750","article-title":"The case for 4-bit precision: K-bit inference scaling laws","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Dettmers","year":"2023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2735490"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref7"},{"issue":"1","key":"ref8","first-page":"2146","article-title":"Neural networks for machine learning","volume":"264","author":"Hinton","year":"2012","journal-title":"Coursera, Video Lectures"},{"article-title":"MobileNets: Efficient convolutional neural networks for mobile vision applications","year":"2017","author":"Howard","key":"ref9"},{"article-title":"Adversarial machine learning at scale","year":"2016","author":"Kurakin","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926381"},{"key":"ref12","first-page":"24401","article-title":"Efficient adversarial attacks on online multi-agent reinforcement learning","volume-title":"Proc. Int. Conf. Adv. Neural Inf. Process. Syst.","volume":"36","author":"Liu","year":"2024"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-017-0528-8"},{"article-title":"Fooling a real car with adversarial traffic signs","year":"2019","author":"Morgulis","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2968345"},{"key":"ref16","first-page":"13931","article-title":"Revisiting adversarial training for imagenet: Architectures, training and generalization across threat models","volume-title":"Proc. Int. Conf. Adv. Neural Inf. Process. Syst.","volume":"36","author":"Singh","year":"2024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2012.02.016"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"Szegedy","key":"ref18"},{"article-title":"Ensemble adversarial training: Attacks and defenses","year":"2017","author":"Tramr","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00411"},{"key":"ref21","first-page":"36246","article-title":"Better diffusion models further improve adversarial training","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wang","year":"2023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3017573"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_39"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC48978.2021.9564956"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3217825"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3179016"},{"article-title":"Autodan: Automatic and interpretable adversarial attacks on large language models","year":"2023","author":"Zhu","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3197190"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9424\/10779329\/10643747.pdf?arnumber=10643747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T04:18:11Z","timestamp":1733890691000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10643747\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":29,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tii.2024.3438284","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"type":"print","value":"1551-3203"},{"type":"electronic","value":"1941-0050"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}