{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T11:28:15Z","timestamp":1763724495988,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T00:00:00Z","timestamp":1599436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,7]]},"DOI":"10.1145\/3386263.3407594","type":"proceedings-article","created":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T21:34:20Z","timestamp":1599255260000},"page":"333-338","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Is It Approximate Computing or Malicious Computing?"],"prefix":"10.1145","author":[{"given":"Ye","family":"Wang","sequence":"first","affiliation":[{"name":"Harbin Institute of Technology, Harbin, China"}]},{"given":"Jian","family":"Dong","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Harbin, China"}]},{"given":"Qian","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Zhaojun","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"given":"Gang","family":"Qu","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,9,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"ACM","author":"Rahmati A.","year":"2015","unstructured":"A. Rahmati , M. Hicks , D. E. Holcomb and K. Fu , \" Probable cause: The deanonymizing effects of approximate DRAM,\" International Symposium on Computer Architecture . ACM , 2015 . A. Rahmati, M. Hicks, D. E. Holcomb and K. Fu, \"Probable cause: The deanonymizing effects of approximate DRAM,\" International Symposium on Computer Architecture. ACM, 2015."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2893356"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98935-8_3"},{"key":"e_1_3_2_2_4_1","first-page":"44","volume-title":"ACM","author":"Regazzoni F.","year":"2018","unstructured":"F. Regazzoni , C. Alippi and I. Polian , \" Security: the dark side of approximate computing?\" Proceedings of the International Conference on Computer-Aided Design . ACM , 2018 , pp. 44 . F. Regazzoni, C. Alippi and I. Polian, \"Security: the dark side of approximate computing?\" Proceedings of the International Conference on Computer-Aided Design. ACM, 2018, pp. 44."},{"key":"e_1_3_2_2_5_1","first-page":"1","article-title":"Privacy leakages in approximate adders","author":"Keshavarz S.","year":"2017","unstructured":"S. Keshavarz and D. Holcomb , \" Privacy leakages in approximate adders ,\" IEEE International Symposium on Circuits and Systems (ISCAS) , 2017 , pp. 1 -- 4 . S. Keshavarz and D. Holcomb, \"Privacy leakages in approximate adders,\" IEEE International Symposium on Circuits and Systems (ISCAS), 2017, pp. 1--4.","journal-title":"IEEE International Symposium on Circuits and Systems (ISCAS)"},{"key":"e_1_3_2_2_6_1","first-page":"387","volume-title":"ACM","author":"Yellu P.","year":"2019","unstructured":"P. Yellu , N. Boskov , M. A. Kinsy and Q. Yu , \" Security Threats in Approximate Computing Systems,\" Proceedings of the 2019 on Great Lakes Symposium on VLSI . ACM , 2019 , pp. 387 -- 392 . P. Yellu, N. Boskov, M. A. Kinsy and Q. Yu, \"Security Threats in Approximate Computing Systems,\" Proceedings of the 2019 on Great Lakes Symposium on VLSI. ACM, 2019, pp. 387--392."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248487.2151008"},{"key":"e_1_3_2_2_8_1","volume-title":"Reconfigurable SRAM architecture with spatial voltage scaling for low power mobile multimedia applications,\" IEEE transactions on very large scale integration (VLSI) systems","author":"Cho M.","year":"2009","unstructured":"M. Cho , J. Schlessman , W. Wolf , , \" Reconfigurable SRAM architecture with spatial voltage scaling for low power mobile multimedia applications,\" IEEE transactions on very large scale integration (VLSI) systems . 2009 , Vol. 19(1), pp. 161-- 165 . M. Cho, J. Schlessman, W. Wolf, et al, \"Reconfigurable SRAM architecture with spatial voltage scaling for low power mobile multimedia applications,\" IEEE transactions on very large scale integration (VLSI) systems. 2009, Vol. 19(1), pp. 161--165."},{"key":"e_1_3_2_2_9_1","volume-title":"Retention-aware placement in DRAM (RAPID): software methods for quasi-nonvolatile DRAM,\" The Twelfth International Symposium on High Performance Computer Architecture","author":"Venkatesan R. K.","year":"2006","unstructured":"R. K. Venkatesan , S. Herr and E. Rotenberg , \" Retention-aware placement in DRAM (RAPID): software methods for quasi-nonvolatile DRAM,\" The Twelfth International Symposium on High Performance Computer Architecture . 2006 . R. K. Venkatesan, S. Herr and E. Rotenberg, \"Retention-aware placement in DRAM (RAPID): software methods for quasi-nonvolatile DRAM,\" The Twelfth International Symposium on High Performance Computer Architecture. 2006."},{"key":"e_1_3_2_2_10_1","first-page":"124","volume-title":"ACM","author":"Sidiroglou-Douskos S.","year":"2011","unstructured":"S. Sidiroglou-Douskos , S. Misailovic , H. Hoffmann , accuracy trade-offs with loop perforation,\" Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering . ACM , 2011 , pp. 124 -- 134 . S. Sidiroglou-Douskos, S. Misailovic, H. Hoffmann, et al, \"Managing performance vs. accuracy trade-offs with loop perforation,\" Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering. ACM, 2011, pp. 124--134."},{"key":"e_1_3_2_2_11_1","first-page":"341","volume-title":"ACM","author":"Li S.","year":"2018","unstructured":"S. Li , S. Park , S. Mahlke . \"Sculptor : Flexible Approximation with Selective Dynamic Loop Perforation,\" Proceedings of the 2018 International Conference on Supercomputing . ACM , 2018 , pp. 341 -- 351 . S. Li, S. Park, S. Mahlke. \"Sculptor: Flexible Approximation with Selective Dynamic Loop Perforation,\" Proceedings of the 2018 International Conference on Supercomputing. ACM, 2018, pp. 341--351."},{"key":"e_1_3_2_2_12_1","volume-title":"A survey on chip to system reverse engineering,\" ACM journal on emerging technologies in computing systems (JETC)","author":"Quadir S. E.","year":"2016","unstructured":"S. E. Quadir , J. Chen , D. Forte , , \" A survey on chip to system reverse engineering,\" ACM journal on emerging technologies in computing systems (JETC) . 2016 , Vol. 13(1), pp. 6 . S. E. Quadir, J. Chen, D. Forte, et al, \"A survey on chip to system reverse engineering,\" ACM journal on emerging technologies in computing systems (JETC). 2016, Vol. 13(1), pp. 6."},{"key":"e_1_3_2_2_13_1","first-page":"1225","volume-title":"Design of low-power high-speed truncation-error-tolerant adder and its application in digital signal processing,\" IEEE transactions on very large scale integration (VLSI) systems 18.8","author":"Zhu N.","year":"2009","unstructured":"N. Zhu , W. L. Goh , W. Zhang , K. S. Yeo , \" Design of low-power high-speed truncation-error-tolerant adder and its application in digital signal processing,\" IEEE transactions on very large scale integration (VLSI) systems 18.8 , 2009 , pp. 1225 -- 1229 . N. Zhu, W. L. Goh, W. Zhang, K. S. Yeo, et al. \"Design of low-power high-speed truncation-error-tolerant adder and its application in digital signal processing,\" IEEE transactions on very large scale integration (VLSI) systems 18.8, 2009, pp. 1225--1229."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299874.3319456"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858345"},{"key":"e_1_3_2_2_16_1","volume-title":"IEEE\/ACM International Conference on Computer Aided Design (ICCAD'17)","author":"Gao M.","year":"2017","unstructured":"M. Gao , Q. Wang , and G. Qu , \" Energy Efficient Runtime Approximate Computing on Data Flow Graphs \", IEEE\/ACM International Conference on Computer Aided Design (ICCAD'17) , November 2017 . M. Gao, Q. Wang, and G. Qu, \"Energy Efficient Runtime Approximate Computing on Data Flow Graphs\", IEEE\/ACM International Conference on Computer Aided Design (ICCAD'17), November 2017."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.176"}],"event":{"name":"GLSVLSI '20: Great Lakes Symposium on VLSI 2020","acronym":"GLSVLSI '20","location":"Virtual Event China"},"container-title":["Proceedings of the 2020 on Great Lakes Symposium on VLSI"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386263.3407594","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386263.3407594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:25Z","timestamp":1750199905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386263.3407594"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,7]]},"references-count":17,"alternative-id":["10.1145\/3386263.3407594","10.1145\/3386263"],"URL":"https:\/\/doi.org\/10.1145\/3386263.3407594","relation":{},"subject":[],"published":{"date-parts":[[2020,9,7]]},"assertion":[{"value":"2020-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}