{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:38Z","timestamp":1750221038740,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3240765.3270589","type":"proceedings-article","created":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T13:36:57Z","timestamp":1541511417000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Machine learning IP protection"],"prefix":"10.1145","author":[{"given":"Rosario","family":"Cammarota","sequence":"first","affiliation":[{"name":"Qualcomm Technologies, Inc."}]},{"given":"Indranil","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Qualcomm Technologies, Inc."}]},{"given":"Ofer","family":"Rosenberg","sequence":"additional","affiliation":[{"name":"Qualcomm Technologies, Inc."}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. We are making device AI ubiquitous. https:\/\/www.qualcomm.com\/news\/onq\/2017\/08\/16\/we-are-making-device-ai-ubiquitous"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"C. Szegedy S. Ioffe V. Vanhoucke and A. Alemi. 2017. Inception-v4 Inception-ResNet and the Impact of Residual Connections on Learning. In AAAI. 4278--4284","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"e_1_3_2_1_3_1","unstructured":"C. Zhang P. Patras and H. Haddadi. 2018. Deep Learning in Mobile and Wireless Networking: A Survey. CoRR abs\/1803.04311 (2018)"},{"key":"e_1_3_2_1_4_1","unstructured":"2015. Qualcomm Smart Protect. https:\/\/www.qualcomm.com\/news\/onq\/2015\/08\/31\/snapdragon-820-countdown-snapdragon-smart-protect-detects-more-mobile-malware"},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Global Platform Technical Overview. https:\/\/globalplatform.org\/specifications\/technical-overview\/"},{"volume-title":"TrustZone Explained: Architectural Features and Use Cases. CIC 2016","author":"Ngabonziza B.","key":"e_1_3_2_1_6_1","unstructured":"B. Ngabonziza, D. Martin, A. Bailey, H. Cho, and S. Martin. 2016. TrustZone Explained: Architectural Features and Use Cases. CIC 2016"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154484"},{"key":"e_1_3_2_1_9_1","unstructured":"2013. Introducing Qualcomm Zeroth Processors: Brain-Inspired Computing. https:\/\/www.qualcomm.com\/news\/onq\/2013\/10\/10\/introducing-qualcomm-zeroth-processors-brain-inspired-computing"},{"volume-title":"CHES 2015","author":"Longo J.","key":"e_1_3_2_1_10_1","unstructured":"J. Longo, E. De Mulder, D. Page, M. Tunstall. SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip. CHES 2015"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024803"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"P. Kocher D. Genkin D. Gruss W. Haas M. Hamburg M. Lipp S. Mangard T. Prescher M. Schwarz Y. Yarom. Spectre Attacks: Exploiting Speculative Execution. CoRR abs\/1801.01203 (2018)","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383912"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2015.7357115"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196105"}],"event":{"name":"ICCAD '18: IEEE\/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN","sponsor":["IEEE-EDS Electronic Devices Society","IEEE CAS","IEEE CEDA"],"location":"San Diego California","acronym":"ICCAD '18"},"container-title":["Proceedings of the International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3270589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3240765.3270589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:44Z","timestamp":1750207424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3270589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":15,"alternative-id":["10.1145\/3240765.3270589","10.1145\/3240765"],"URL":"https:\/\/doi.org\/10.1145\/3240765.3270589","relation":{},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}