{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:00:26Z","timestamp":1764842426620,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Hong Kong Research Grants Council","award":["14205018"],"award-info":[{"award-number":["14205018"]}]},{"name":"National Natural Science Foundation of China","award":["61532017"],"award-info":[{"award-number":["61532017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3423338","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T18:27:02Z","timestamp":1604341622000},"page":"101-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["DeepDyve: Dynamic Verification for Deep Neural Networks"],"prefix":"10.1145","author":[{"given":"Yu","family":"Li","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Min","family":"Li","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Ye","family":"Tian","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Qiang","family":"Xu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1999.809458"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2018.8515692"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7926952"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001177"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1993.298655"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1990.137773"},{"key":"e_1_3_2_2_7_1","volume-title":"Automation &Test in Europe Conference & Exhibition (DATE). IEEE, 593--596","author":"Deng Jiacnao","year":"2015","unstructured":"Jiacnao Deng , Yuntan Rang , Zidong Du , Ymg Wang , Huawei Li , Olivier Temam , Paolo Ienne , David Novo , Xiaowei Li , Yunji Chen , 2015 . Retraining-based timing error mitigation for hardware neural networks. In Design , Automation &Test in Europe Conference & Exhibition (DATE). IEEE, 593--596 . Jiacnao Deng, Yuntan Rang, Zidong Du, Ymg Wang, Huawei Li, Olivier Temam,Paolo Ienne, David Novo, Xiaowei Li, Yunji Chen, et al. 2015. Retraining-based timing error mitigation for hardware neural networks. In Design, Automation &Test in Europe Conference & Exhibition (DATE). IEEE, 593--596."},{"volume-title":"Neural Computing and Applications (Neural. Comput. Appl.)","author":"Dias Fernando Morgado","key":"e_1_3_2_2_8_1","unstructured":"Fernando Morgado Dias , Rui Borralho , Pedro Fontes , and Ana Antunes . 2010. FTSET-a software tool for fault tolerance evaluation and improvement . In Neural Computing and Applications (Neural. Comput. Appl.) , Vol. 19 . Springer , 701--712. Fernando Morgado Dias, Rui Borralho, Pedro Fontes, and Ana Antunes. 2010. FTSET-a software tool for fault tolerance evaluation and improvement. In Neural Computing and Applications (Neural. Comput. Appl.), Vol. 19. Springer, 701--712."},{"key":"e_1_3_2_2_9_1","volume-title":"Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations (ICLR). OpenReview.net.","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations (ICLR). OpenReview.net. Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In 3rd International Conference on Learning Representations (ICLR). OpenReview.net."},{"volume-title":"Trained Quantization and Huffman Coding. In 4th International Conference on Learning Representations (ICLR). Open-Review.net.","author":"Han Song","key":"e_1_3_2_2_10_1","unstructured":"Song Han , Huizi Mao , and William J. Dally . 2016. Deep Compression: Compressing Deep Neural Network with Pruning , Trained Quantization and Huffman Coding. In 4th International Conference on Learning Representations (ICLR). Open-Review.net. Song Han, Huizi Mao, and William J. Dally. 2016. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding. In 4th International Conference on Learning Representations (ICLR). Open-Review.net."},{"key":"e_1_3_2_2_11_1","volume-title":"NIPS Deep Learning and Representation Learning Workshop(NIPS Workshop). Curran Associates Inc.","author":"Hinton Geoffrey","year":"2014","unstructured":"Geoffrey Hinton , Oriol Vinyals , and Jeffrey Dean . 2014 . Distilling the Knowledge in a Neural Network . In NIPS Deep Learning and Representation Learning Workshop(NIPS Workshop). Curran Associates Inc. Geoffrey Hinton, Oriol Vinyals, and Jeffrey Dean. 2014. Distilling the Knowledge in a Neural Network. In NIPS Deep Learning and Representation Learning Workshop(NIPS Workshop). Curran Associates Inc."},{"key":"e_1_3_2_2_12_1","volume-title":"28th USENIX Security Symposium (USENIX Security). USENIX Association, 497--514","author":"Hong Sanghyun","year":"2019","unstructured":"Sanghyun Hong , Pietro Frigo , Yiitcan Kaya , Cristiano Giuffrida , and Tudor Dumitras ,. 2019 . Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks . In 28th USENIX Security Symposium (USENIX Security). USENIX Association, 497--514 . Sanghyun Hong, Pietro Frigo, Yiitcan Kaya, Cristiano Giuffrida, and Tudor Dumitras,. 2019. Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks. In 28th USENIX Security Symposium (USENIX Security). USENIX Association, 497--514."},{"key":"e_1_3_2_2_13_1","volume-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861(2017).","author":"Howard Andrew G","year":"2017","unstructured":"Andrew G Howard , Menglong Zhu , Bo Chen , Dmitry Kalenichenko , Weijun Wang , Tobias Weyand , Marco Andreetto , and Hartwig Adam . 2017 . Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861(2017). Andrew G Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. 2017. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861(2017)."},{"volume-title":"ISO-26262: Road vehicles -- Functional safety","author":"ISO.","key":"e_1_3_2_2_14_1","unstructured":"ISO. 2016. ISO-26262: Road vehicles -- Functional safety . ISO , Geneva, Switzerland . ISO. 2016. ISO-26262: Road vehicles -- Functional safety. ISO, Geneva, Switzerland."},{"volume-title":"ACM\/IEEE 44th Annual International Symposium on Computer Architecture (ISCA). IEEE, 1--12","author":"Norman","key":"e_1_3_2_2_15_1","unstructured":"Norman P Jouppi and et al. 2017. In-data center performance analysis of a tensor processing unit . In ACM\/IEEE 44th Annual International Symposium on Computer Architecture (ISCA). IEEE, 1--12 . Norman P Jouppi and et al. 2017. In-data center performance analysis of a tensor processing unit. In ACM\/IEEE 44th Annual International Symposium on Computer Architecture (ISCA). IEEE, 1--12."},{"key":"e_1_3_2_2_16_1","volume-title":"Automation & Test in Europe Conference & Exhibition(DATE). IEEE, 1--6.","author":"Kim Sung","year":"2018","unstructured":"Sung Kim , Patrick Howe , Thierry Moreau , Armin Alaghi , Luis Ceze , and Visvesh Sathe . 2018 . MATIC: Learning around errors for efficient low-voltage neural net-work accelerators. In Design , Automation & Test in Europe Conference & Exhibition(DATE). IEEE, 1--6. Sung Kim, Patrick Howe, Thierry Moreau, Armin Alaghi, Luis Ceze, and Visvesh Sathe. 2018. MATIC: Learning around errors for efficient low-voltage neural net-work accelerators. In Design, Automation & Test in Europe Conference & Exhibition(DATE). IEEE, 1--6."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"e_1_3_2_2_18_1","unstructured":"Raghuraman Krishnamoorthi. 2018. Quantizing deep convolutional networks for efficient inference: A whitepaper.arXiv preprint arXiv:1806.08342.  Raghuraman Krishnamoorthi. 2018. Quantizing deep convolutional networks for efficient inference: A whitepaper.arXiv preprint arXiv:1806.08342."},{"key":"e_1_3_2_2_20_1","volume-title":"5th International Conference on Learning Representations(ICLR). OpenReview.net.","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin , Ian J. Goodfellow , and Samy Bengio . 2017 . Adversarial Machine Learning at Scale . In 5th International Conference on Learning Representations(ICLR). OpenReview.net. Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2017. Adversarial Machine Learning at Scale. In 5th International Conference on Learning Representations(ICLR). OpenReview.net."},{"key":"e_1_3_2_2_21_1","unstructured":"Ya Le and Xuan Yang. 2015. Tiny imagenet visual recognition challenge. Stanford CS 231N Course.  Ya Le and Xuan Yang. 2015. Tiny imagenet visual recognition challenge. Stanford CS 231N Course."},{"volume-title":"Advances in neural information processing systems (NIPS)","author":"LeCun Yann","key":"e_1_3_2_2_22_1","unstructured":"Yann LeCun , John S Denker , and Sara A Solla . 1990. Optimal brain damage . In Advances in neural information processing systems (NIPS) . Curran Associates Inc ., 598--605. Yann LeCun, John S Denker, and Sara A Solla. 1990. Optimal brain damage. In Advances in neural information processing systems (NIPS). Curran Associates Inc., 598--605."},{"key":"e_1_3_2_2_23_1","first-page":"1","article-title":"Understanding error propagation in deep learning neural network (DNN) accelerators and applications. In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis (SC)","volume":"8","author":"Li Guanpeng","year":"2017","unstructured":"Guanpeng Li and 2017 . Understanding error propagation in deep learning neural network (DNN) accelerators and applications. In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis (SC) . ACM , 8 : 1 -- 8 :12. Guanpeng Li and et al. 2017. Understanding error propagation in deep learning neural network (DNN) accelerators and applications. In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis (SC). ACM, 8:1--8:12.","journal-title":"ACM"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359831"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062310"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203770"},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence (AAAI). AAAI Press,1652--1659","author":"Luo Bo","year":"2018","unstructured":"Bo Luo , Yannan Liu , Lingxiao Wei , and Qiang Xu . 2018 . Towards imperceptible and robust adversarial example attacks against neural networks . In Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence (AAAI). AAAI Press,1652--1659 . Bo Luo, Yannan Liu, Lingxiao Wei, and Qiang Xu. 2018. Towards imperceptible and robust adversarial example attacks against neural networks. In Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence (AAAI). AAAI Press,1652--1659."},{"key":"e_1_3_2_2_28_1","volume-title":"In6th International Conference on Learning Representations (ICLR). OpenReview.net.","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2018 . Towards Deep Learning Models Resistant to Adversarial Attacks . In6th International Conference on Learning Representations (ICLR). OpenReview.net. Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In6th International Conference on Learning Representations (ICLR). OpenReview.net."},{"key":"e_1_3_2_2_29_1","volume-title":"Sied Mehdi Fakhraie, and Caro Lucas","author":"Mahdiani Hamid Reza","year":"2012","unstructured":"Hamid Reza Mahdiani , Sied Mehdi Fakhraie, and Caro Lucas . 2012 . Relaxed fault-tolerant hardware implementation of neural networks in the presence of multiple transient errors. IEEE transactions on neural networks and learning systems (TNNLS) 23, 1215--1228. Hamid Reza Mahdiani, Sied Mehdi Fakhraie, and Caro Lucas. 2012. Relaxed fault-tolerant hardware implementation of neural networks in the presence of multiple transient errors. IEEE transactions on neural networks and learning systems (TNNLS)23, 1215--1228."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2016.7800490"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_2_33_1","volume-title":"Bit-Flip Attack: Crushing Neural Network with Progressive Bit Search. In IEEE\/CVF International Conference on Computer Vision (ICCV). IEEE, 1211--1220","author":"Rakin Adnan Siraj","year":"2019","unstructured":"Adnan Siraj Rakin , Zhezhi He , and Deliang Fan . 2019 . Bit-Flip Attack: Crushing Neural Network with Progressive Bit Search. In IEEE\/CVF International Conference on Computer Vision (ICCV). IEEE, 1211--1220 . Adnan Siraj Rakin, Zhezhi He, and Deliang Fan. 2019. Bit-Flip Attack: Crushing Neural Network with Progressive Bit Search. In IEEE\/CVF International Conference on Computer Vision (ICCV). IEEE, 1211--1220."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3195997"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001165"},{"key":"e_1_3_2_2_36_1","volume-title":"Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 17--24","author":"Romailler Yolan","year":"2017","unstructured":"Yolan Romailler and Sylvain Pelissier . 2017 . Practical fault attack against theEd25519 and EdDSA signature schemes . In Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 17--24 . Yolan Romailler and Sylvain Pelissier. 2017. Practical fault attack against theEd25519 and EdDSA signature schemes. In Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 17--24."},{"volume-title":"Neural Computing and Applications (Neural. Comput. Appl.)","author":"Schorn Christoph","key":"e_1_3_2_2_37_1","unstructured":"Christoph Schorn , Thomas Elsken , Sebastian Vogel , Armin Runge , Andre Guntoro , and Gerd Ascheid . 2020. Automated design of error-resilient and hardware-efficient deep neural networks . In Neural Computing and Applications (Neural. Comput. Appl.) . Springer . Christoph Schorn, Thomas Elsken, Sebastian Vogel, Armin Runge, Andre Guntoro, and Gerd Ascheid. 2020. Automated design of error-resilient and hardware-efficient deep neural networks. In Neural Computing and Applications (Neural. Comput. Appl.). Springer."},{"key":"e_1_3_2_2_38_1","volume-title":"Efficient On-Line Error Detection and Mitigation for Deep Neural Network Accelerators. In International Conference on Computer Safety, Reliability, and Security (SAFECOMP). Springer, 205--219","author":"Schorn Christoph","year":"2018","unstructured":"Christoph Schorn , Andre Guntoro , and Gerd Ascheid . 2018 . Efficient On-Line Error Detection and Mitigation for Deep Neural Network Accelerators. In International Conference on Computer Safety, Reliability, and Security (SAFECOMP). Springer, 205--219 . Christoph Schorn, Andre Guntoro, and Gerd Ascheid. 2018. Efficient On-Line Error Detection and Mitigation for Deep Neural Network Accelerators. In International Conference on Computer Safety, Reliability, and Security (SAFECOMP). Springer, 205--219."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"Johannes Stallkamp Marc Schlipsing Jan Salmen and Christian Igel. 2012. Man vs.computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural Networks32 323--332.  Johannes Stallkamp Marc Schlipsing Jan Salmen and Christian Igel. 2012. Man vs.computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural Networks32 323--332.","DOI":"10.1016\/j.neunet.2012.02.016"},{"key":"e_1_3_2_2_40_1","volume-title":"Efficient Net: Rethinking Model Scaling for Convolutional Neural Networks. In Proceedings of the 36th International Conference on Machine Learning (ICML)","volume":"97","author":"Tan Mingxing","unstructured":"Mingxing Tan and Quoc V. Le . 2019 . Efficient Net: Rethinking Model Scaling for Convolutional Neural Networks. In Proceedings of the 36th International Conference on Machine Learning (ICML) , Vol. 97 . PMLR, 6105--6114. Mingxing Tan and Quoc V. Le. 2019. Efficient Net: Rethinking Model Scaling for Convolutional Neural Networks. In Proceedings of the 36th International Conference on Machine Learning (ICML), Vol. 97. PMLR, 6105--6114."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062248"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC47756.2020.9045134"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2017.7918284"},{"key":"e_1_3_2_2_44_1","volume-title":"29th USENIX Security Symposium (USENIX Security). USENIX Association.","author":"Yao Fan","year":"2020","unstructured":"Fan Yao , Adnan Siraj Rakin , and Deliang Fan . 2020 . DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips . In 29th USENIX Security Symposium (USENIX Security). USENIX Association. Fan Yao, Adnan Siraj Rakin, and Deliang Fan. 2020. DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips. In 29th USENIX Security Symposium (USENIX Security). USENIX Association."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317825"},{"volume-title":"IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE,14083--14091","author":"Zhezhi HeAdnan Siraj Chaitali Chakrabarti","key":"e_1_3_2_2_46_1","unstructured":"Chaitali Chakrabarti Zhezhi HeAdnan Siraj Rakin, Jingtao Li and Deliang Fan .2020. Defending and Harnessing the Bit-Flip based Adversarial Weight Attack . In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE,14083--14091 . Chaitali Chakrabarti Zhezhi HeAdnan Siraj Rakin, Jingtao Li and Deliang Fan.2020. Defending and Harnessing the Bit-Flip based Adversarial Weight Attack. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE,14083--14091."}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CCS '20"},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3423338","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3423338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:20Z","timestamp":1750197740000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3423338"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":45,"alternative-id":["10.1145\/3372297.3423338","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3423338","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}