{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:29Z","timestamp":1750221089680,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T00:00:00Z","timestamp":1548028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-18-2-0057"],"award-info":[{"award-number":["FA8750-18-2-0057"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1717657"],"award-info":[{"award-number":["1717657"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,21]]},"DOI":"10.1145\/3287624.3288753","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T21:45:18Z","timestamp":1547847918000},"page":"518-525","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["AdverQuil"],"prefix":"10.1145","author":[{"given":"Hsin-Pai","family":"Cheng","sequence":"first","affiliation":[{"name":"Duke University"}]},{"given":"Juncheng","family":"Shen","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Huanrui","family":"Yang","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Qing","family":"Wu","sequence":"additional","affiliation":[{"name":"Air Force Research Laboratory"}]},{"given":"Hai","family":"Li","sequence":"additional","affiliation":[{"name":"Duke University"}]},{"given":"Yiran","family":"Chen","sequence":"additional","affiliation":[{"name":"Duke University"}]}],"member":"320","published-online":{"date-parts":[[2019,1,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1097","volume-title":"Advances in neural information processing systems","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey E Hinton . Imagenet classification with deep convolutional neural networks . In Advances in neural information processing systems , pages 1097 -- 1105 , 2012 . Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097--1105, 2012."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1604850113"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.781"},{"key":"e_1_3_2_1_7_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 , 2014 . Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572, 2014."},{"key":"e_1_3_2_1_8_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 , 2013 . Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199, 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"e_1_3_2_1_11_1","volume-title":"The space of transferable adversarial examples. arXiv preprint arXiv:1704.03453","author":"Tram\u00c3\u013ar Florian","year":"2017","unstructured":"Florian Tram\u00c3\u013ar , Nicolas Papernot , Ian Goodfellow , Dan Boneh , and Patrick McDaniel . The space of transferable adversarial examples. arXiv preprint arXiv:1704.03453 , 2017 . Florian Tram\u00c3\u013ar, Nicolas Papernot, Ian Goodfellow, Dan Boneh, and Patrick McDaniel. The space of transferable adversarial examples. arXiv preprint arXiv:1704.03453, 2017."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Fifth International Conference on Learning Representations","author":"Liu Yanpei","year":"2017","unstructured":"Yanpei Liu , Xinyun Chen , Chang Liu , and Dawn Song . Delving into transferable adversarial examples and black-box attacks . Proceedings of the Fifth International Conference on Learning Representations , 2017 . Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. Delving into transferable adversarial examples and black-box attacks. Proceedings of the Fifth International Conference on Learning Representations, 2017."},{"key":"e_1_3_2_1_13_1","volume-title":"McDaniel. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204","author":"Tram\u00c3\u013ar Florian","year":"2017","unstructured":"Florian Tram\u00c3\u013ar , Alexey Kurakin , Nicolas Papernot , Dan Boneh , and Patrick D . McDaniel. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 , 2017 . Florian Tram\u00c3\u013ar, Alexey Kurakin, Nicolas Papernot, Dan Boneh, and Patrick D. McDaniel. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204, 2017."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Fifth International Conference on Learning Representations","author":"Li Xin","year":"2016","unstructured":"Xin Li and Fuxin Li . Adversarial examples detection in deep networks with convolutional filter statistics . Proceedings of the Fifth International Conference on Learning Representations , 2016 . Xin Li and Fuxin Li. Adversarial examples detection in deep networks with convolutional filter statistics. Proceedings of the Fifth International Conference on Learning Representations, 2016."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1254642"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"The 2013 International Joint Conference on","author":"Esser Steve K","year":"2013","unstructured":"Steve K Esser , Alexander Andreopoulos , Rathinakumar Appuswamy , Pallab Datta , Davis Barch , Arnon Amir , John Arthur , Andrew Cassidy , Myron Flickner , Paul Merolla , Cognitive computing systems: Algorithms and applications for networks of neurosynaptic cores. In Neural Networks (IJCNN) , The 2013 International Joint Conference on , pages 1 -- 10 . IEEE, 2013 . Steve K Esser, Alexander Andreopoulos, Rathinakumar Appuswamy, Pallab Datta, Davis Barch, Arnon Amir, John Arthur, Andrew Cassidy, Myron Flickner, Paul Merolla, et al. Cognitive computing systems: Algorithms and applications for networks of neurosynaptic cores. In Neural Networks (IJCNN), The 2013 International Joint Conference on, pages 1--10. IEEE, 2013."},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"The 2013 International Joint Conference on","author":"Amir Arnon","year":"2013","unstructured":"Arnon Amir , Pallab Datta , William P Risk , Andrew S Cassidy , Jeffrey A Kusnitz , Steve K Esser , Alexander Andreopoulos , Theodore M Wong , Myron Flickner , Rodrigo Alvarez-Icaza , Cognitive computing programming paradigm: a corelet language for composing networks of neurosynaptic cores. In Neural Networks (IJCNN) , The 2013 International Joint Conference on , pages 1 -- 10 . IEEE, 2013 . Arnon Amir, Pallab Datta, William P Risk, Andrew S Cassidy, Jeffrey A Kusnitz, Steve K Esser, Alexander Andreopoulos, Theodore M Wong, Myron Flickner, Rodrigo Alvarez-Icaza, et al. Cognitive computing programming paradigm: a corelet language for composing networks of neurosynaptic cores. In Neural Networks (IJCNN), The 2013 International Joint Conference on, pages 1--10. IEEE, 2013."},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"The 2013 International Joint Conference on","author":"Cassidy Andrew S","year":"2013","unstructured":"Andrew S Cassidy , Paul Merolla , John V Arthur , Steve K Esser , Bryan Jackson , Rodrigo Alvarez-Icaza , Pallab Datta , Jun Sawada , Theodore M Wong , Vitaly Feldman , Cognitive computing building block: A versatile and efficient digital neuron model for neurosynaptic cores. In Neural Networks (IJCNN) , The 2013 International Joint Conference on , pages 1 -- 10 . IEEE, 2013 . Andrew S Cassidy, Paul Merolla, John V Arthur, Steve K Esser, Bryan Jackson, Rodrigo Alvarez-Icaza, Pallab Datta, Jun Sawada, Theodore M Wong, Vitaly Feldman, et al. Cognitive computing building block: A versatile and efficient digital neuron model for neurosynaptic cores. In Neural Networks (IJCNN), The 2013 International Joint Conference on, pages 1--10. IEEE, 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1981.4767047"},{"key":"e_1_3_2_1_20_1","volume-title":"On detecting adversarial perturbations. arXiv preprint arXiv:1702.04267","author":"Metzen Jan Hendrik","year":"2017","unstructured":"Jan Hendrik Metzen , Tim Genewein , Volker Fischer , and Bastian Bischoff . On detecting adversarial perturbations. arXiv preprint arXiv:1702.04267 , 2017 . Jan Hendrik Metzen, Tim Genewein, Volker Fischer, and Bastian Bischoff. On detecting adversarial perturbations. arXiv preprint arXiv:1702.04267, 2017."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the Fifth International Conference on Learning Representations","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin , Ian J. Goodfellow , and Samy Bengio . Adversarial machine learning at scale . Proceedings of the Fifth International Conference on Learning Representations , 2017 . Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. Adversarial machine learning at scale. Proceedings of the Fifth International Conference on Learning Representations, 2017."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/3199700.3199718"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"issue":"11","key":"e_1_3_2_1_24_1","first-page":"5692","article-title":"A comparison of methods for assessing the relative importance of input variables in artificial neural networks","volume":"9","author":"Ibrahim OM","year":"2013","unstructured":"OM Ibrahim . A comparison of methods for assessing the relative importance of input variables in artificial neural networks . Journal of Applied Sciences Research , 9 ( 11 ): 5692 -- 5700 , 2013 . OM Ibrahim. A comparison of methods for assessing the relative importance of input variables in artificial neural networks. Journal of Applied Sciences Research, 9(11):5692--5700, 2013.","journal-title":"Journal of Applied Sciences Research"},{"key":"e_1_3_2_1_25_1","unstructured":"Steven K Esser Paul A Merolla John V Arthur Andrew S Cassidy Rathinakumar Appuswamy Alexander Andreopoulos David J Berg Jeffrey L McKinstry Timothy Melano Davis R Barch etal Convolutional networks for fast energy-efficient neuromorphic computing. Proceedings of the National Academy of Sciences.  Steven K Esser Paul A Merolla John V Arthur Andrew S Cassidy Rathinakumar Appuswamy Alexander Andreopoulos David J Berg Jeffrey L McKinstry Timothy Melano Davis R Barch et al. Convolutional networks for fast energy-efficient neuromorphic computing. Proceedings of the National Academy of Sciences."}],"event":{"name":"ASPDAC '19: 24th Asia and South Pacific Design Automation Conference","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEICE ESS Institute of Electronics, Information and Communication Engineers, Engineering Sciences Society","IEEE CAS","IEEE CEDA","IPSJ SIG-SLDM Information Processing Society of Japan, SIG System LSI Design Methodology"],"location":"Tokyo Japan","acronym":"ASPDAC '19"},"container-title":["Proceedings of the 24th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287624.3288753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287624.3288753","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3287624.3288753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:54Z","timestamp":1750208274000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3287624.3288753"}},"subtitle":["an efficient adversarial detection and alleviation technique for black-box neuromorphic computing systems"],"short-title":[],"issued":{"date-parts":[[2019,1,21]]},"references-count":25,"alternative-id":["10.1145\/3287624.3288753","10.1145\/3287624"],"URL":"https:\/\/doi.org\/10.1145\/3287624.3288753","relation":{},"subject":[],"published":{"date-parts":[[2019,1,21]]},"assertion":[{"value":"2019-01-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}