{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:28:07Z","timestamp":1774801687387,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T00:00:00Z","timestamp":1604275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-19-1-2496"],"award-info":[{"award-number":["N00014-19-1-2496"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Foundation","award":["1834701, 1834324, 1839511, 1724341"],"award-info":[{"award-number":["1834701, 1834324, 1839511, 1724341"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,2]]},"DOI":"10.1145\/3400302.3415768","type":"proceedings-article","created":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T01:20:55Z","timestamp":1608254455000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Know the unknowns"],"prefix":"10.1145","author":[{"given":"Qi","family":"Zhu","sequence":"first","affiliation":[{"name":"Northwestern University"}]},{"given":"Wenchao","family":"Li","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Hyoseung","family":"Kim","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Yecheng","family":"Xiang","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Kacper","family":"Wardega","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Zhilu","family":"Wang","sequence":"additional","affiliation":[{"name":"Northwestern University"}]},{"given":"Yixuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Northwestern University"}]},{"given":"Hengyi","family":"Liang","sequence":"additional","affiliation":[{"name":"Northwestern University"}]},{"given":"Chao","family":"Huang","sequence":"additional","affiliation":[{"name":"Northwestern University"}]},{"given":"Jiameng","family":"Fan","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Hyunjong","family":"Choi","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2020,12,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Conference on Machine Learning","author":"Achiam J.","year":"2017"},{"key":"e_1_3_2_1_2_1","volume-title":"Thirty-Second AAAI Conference on Artificial Intelligence","author":"Alshiekh M.","year":"2018"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3203407"},{"key":"e_1_3_2_1_4_1","volume-title":"Adaptive Control","author":"\u00c5str\u00f6m K.","year":"2013"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/acs.2411"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.919277"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2001.990593"},{"key":"e_1_3_2_1_8_1","volume-title":"Deeplaser: Practical fault attack on deep neural networks. arXiv preprint arXiv:1806.05859","author":"Breier J.","year":"2018"},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Conference on Security","author":"Checkoway S.","year":"2011"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"SC","author":"Chen Z.","year":"2019"},{"key":"e_1_3_2_1_11_1","volume-title":"IEEE International Conference on Computer Design (ICCD)","author":"Choi H.","year":"2020"},{"key":"e_1_3_2_1_12_1","volume-title":"Brief Presentations of RTAS","author":"Choi H.","year":"2019"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2019.00028"},{"key":"e_1_3_2_1_14_1","first-page":"8092","volume-title":"Advances in Neural Information Processing Systems","author":"Chow Y.","year":"2018"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358213"},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE RTCSA","author":"De D.","year":"2019"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2015.28"},{"key":"e_1_3_2_1_18_1","volume-title":"Serdab: An IoT framework for partitioning neural networks computation across multiple enclaves. arXiv:2005.06043","author":"Elgamal T.","year":"2020"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942059"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59152-6_30"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426658"},{"key":"e_1_3_2_1_22_1","first-page":"73","volume-title":"Proceedings of the 10th ACM\/IEEE International Conference on Information Processing in Sensor Networks","author":"Ferrari F.","year":"2011"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2014.28"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_30"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2014.2301795"},{"key":"e_1_3_2_1_26_1","volume-title":"Privado: Practical and secure DNN inference with enclaves. arXiv preprint arXiv:1810.00602","author":"Grover K.","year":"2018"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.477249"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/894106"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-53288-8_26"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358228"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3013071"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302504.3311811"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313151.3313165"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218742"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081360"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3093337.3037698"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2014.6925998"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2018.05.003"},{"issue":"1","key":"e_1_3_2_1_39_1","first-page":"1","article-title":"Predictable shared cache management for multi-core real-time virtualization","volume":"17","author":"Kim H.","year":"2017","journal-title":"ACM TECS"},{"key":"e_1_3_2_1_40_1","volume-title":"MobiCom","author":"Lee T.","year":"2019"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/002071700411304"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2018.00024"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2006.875511"},{"key":"e_1_3_2_1_44_1","volume-title":"2020 International Conference on Computer-Aided Design (ICCAD)","author":"Liang H.","year":"2020"},{"key":"e_1_3_2_1_45_1","first-page":"217","volume-title":"International Conference on Computer Design (ICCD)","author":"Liang H.","year":"2019"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2803174"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2018.00027"},{"key":"e_1_3_2_1_48_1","volume-title":"ECRTS","author":"Pazzaglia P.","year":"2018"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55754-6_6"},{"key":"e_1_3_2_1_50_1","first-page":"1211","volume-title":"International Conference on Computer Vision","author":"Rakin A. S.","year":"2019"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.774906"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465834"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.1998.703255"},{"key":"e_1_3_2_1_54_1","first-page":"171","article-title":"Weakly hard schedulability analysis for fixed priority scheduling of periodic real-time tasks","volume":"16","author":"Sun Y.","year":"2017","journal-title":"ACM TECS"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2013.106"},{"key":"e_1_3_2_1_56_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy C.","year":"2013"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECC.2016.7810677"},{"key":"e_1_3_2_1_58_1","volume-title":"International Conference on Computer-Aided Design (ICCAD)","author":"Wang Y.","year":"2020"},{"key":"e_1_3_2_1_59_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Wardega K.","year":"2020"},{"key":"e_1_3_2_1_60_1","first-page":"67","volume-title":"C.","author":"Wittenmark B.","year":"1995"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60508-7_28"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS46320.2019.00042"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2015.29"},{"key":"e_1_3_2_1_64_1","volume-title":"Robust invariant sets computation for switched discrete-time polynomial systems. arXiv preprint arXiv:1811.11454","author":"Xue B.","year":"2018"},{"key":"e_1_3_2_1_65_1","volume-title":"Analysis and Optimization of Soft Error Tolerance Strategies for Real-Time Systems. In International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ISSS)","author":"Zheng B.","year":"2015"},{"key":"e_1_3_2_1_66_1","volume-title":"ACM Transaction on Cyber-Physical Systems","author":"Zheng B.","year":"2019"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2018.00028"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60508-7_7"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96145-3_38"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2864271"}],"event":{"name":"ICCAD '20: IEEE\/ACM International Conference on Computer-Aided Design","location":"Virtual Event USA","acronym":"ICCAD '20","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA","IEEE CS"]},"container-title":["Proceedings of the 39th International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400302.3415768","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3400302.3415768","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3400302.3415768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:42Z","timestamp":1750199922000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400302.3415768"}},"subtitle":["addressing disturbances and uncertainties in autonomous systems"],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":70,"alternative-id":["10.1145\/3400302.3415768","10.1145\/3400302"],"URL":"https:\/\/doi.org\/10.1145\/3400302.3415768","relation":{},"subject":[],"published":{"date-parts":[[2020,11,2]]},"assertion":[{"value":"2020-12-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}