{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:26:31Z","timestamp":1775471191918,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/vts48691.2020.9107582","type":"proceedings-article","created":{"date-parts":[[2020,6,4]],"date-time":"2020-06-04T20:30:31Z","timestamp":1591302631000},"page":"1-6","source":"Crossref","is-referenced-by-count":17,"title":["Sequence Triggered Hardware Trojan in Neural Network Accelerator"],"prefix":"10.1109","author":[{"given":"Zizhen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jing","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Huawei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaowei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref12","first-page":"2574","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref15","first-page":"1765","article-title":"2017. Universal Adversarial Perturbations","author":"moosavi-dezfooli","year":"2017","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref16","article-title":"Synthesizing robust adversarial examples","author":"athalye","year":"0"},{"key":"ref17","article-title":"Robust physical-world attacks on machine learning models","author":"evtimov","year":"0"},{"key":"ref18","article-title":"Adversarial patch","author":"brown","year":"0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715027"},{"key":"ref4","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","author":"sutskever","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2018.00024"},{"key":"ref3","first-page":"91","article-title":"Faster r-cnn: Towards real-time object detection with region proposal networks","author":"ren","year":"2015","journal-title":"Advances in NeuralInformation Processing Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2933524"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2847263.2847265"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref7","article-title":"Towards the science of security and privacy in machine learning","author":"papernot","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.690"},{"key":"ref9","article-title":"Trojaning attack on neural networks","author":"liu","year":"2017","journal-title":"Symposium on Network and Distributed System Security"},{"key":"ref1","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991125"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203770"},{"key":"ref21","article-title":"Badnets: identifying vulnerabilities in the machine learning model supply chain","author":"gu","year":"0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383920"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126964"},{"key":"ref26","article-title":"Hardware trojan attacks on neural networks","author":"clements","year":"0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2018.00093"}],"event":{"name":"2020 IEEE 38th VLSI Test Symposium (VTS)","location":"San Diego, CA, USA","start":{"date-parts":[[2020,4,5]]},"end":{"date-parts":[[2020,4,8]]}},"container-title":["2020 IEEE 38th VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9106465\/9107548\/09107582.pdf?arnumber=9107582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:04:42Z","timestamp":1656601482000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9107582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/vts48691.2020.9107582","relation":{},"subject":[],"published":{"date-parts":[[2020,4]]}}}