{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:52Z","timestamp":1750220572181,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T00:00:00Z","timestamp":1624320000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,22]]},"DOI":"10.1145\/3453688.3461756","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T23:13:29Z","timestamp":1624058009000},"page":"195-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Energy-Efficient and Adversarially Robust Machine Learning with Selective Dynamic Band Filtering"],"prefix":"10.1145","author":[{"given":"Neha","family":"Nagarkar","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Khaled","family":"Khasawneh","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[{"name":"University of California, Davis, Davis, CA, USA"}]},{"given":"Avesta","family":"Sasan","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[{"name":"University of California, Davis, Davis, CA, USA"}]},{"given":"Sai Manoj","family":"Pudukotai Dinakarrao","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,22]]},"reference":[{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_1_1","unstructured":"2019. Tencent Keen Security Lab: Experimental Security Research of Tesla Autopilot. Retrieved March 03, 2019 from https:\/\/keenlab.tencent.com\/en\/2019\/ 03\/29\/Tencent-Keen-Security-Lab-Experimental-Security-Research-of-Tesla- Autopilot\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Vinod Nair Alex Krizhevsky and Geoffrey Hinton. 2008. The CIFAR-10 dataset."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.136597"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380446.3430628"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.127960"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner. 2016. Towards Evaluating the Robustness of Neural Networks. arXiv:cs.CR\/1608.04644","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3267502"},{"key":"e_1_3_2_1_8_1","volume-title":"An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models. 2020 IEEE International Conference on Pervasive Computing and Communications (PerCom)","author":"Deng Yao","year":"2020","unstructured":"Yao Deng, Xi Zheng, Tianyi Zhang, Chen Chen, Guannan Lou, and Miryung Kim. 2020. An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models. 2020 IEEE International Conference on Pervasive Computing and Communications (PerCom) (2020), 1--10."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317762"},{"key":"e_1_3_2_1_10_1","volume-title":"International Journal On Advanced Computer Theory And Engineering (IJACTE) 5","author":"Ravichandran Mohammed Gulam","year":"2016","unstructured":"Mohammed Gulam Ahamad D.Ravichandran, Ramesh Nimmatoori. 2016. Mathematical Representations of 1D, 2D, and 3D Wavelet Transform for Image Coding. International Journal On Advanced Computer Theory And Engineering (IJACTE) 5 (2016). Issue 3."},{"key":"e_1_3_2_1_11_1","unstructured":"Chih-Hsien Hsia Jen-Shiun Chiang and Jing-Ming Guo. 2011. Multiple Moving Objects Detection and Tracking Using Discrete Wavelet Transform."},{"key":"e_1_3_2_1_12_1","unstructured":"Shaoqing Ren Jian Sun Kaiming He Xiangyu Zhang. 2015. Deep Residual Learning for Image Recognition. arXiv:cs.CV\/1512.03385"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Seyed-Mohsen Moosavi-Dezfooli Alhussein Fawzi and Pascal Frossard. 2016. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks. 2574-- 2582. https:\/\/doi.org\/10.1109\/CVPR.2016.282","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_15_1","unstructured":"Anqi Xu Rey Wiyatno. 2018. Maximal Jacobian-based Saliency Map Attack. arXiv:cs.LG\/1808.07945"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030-01258--8_39"},{"key":"e_1_3_2_1_17_1","volume-title":"Adversarial Examples: Attacks and Defenses for Deep Learning. arXiv:cs.LG\/1712.07107","author":"Xiaolin Li Xiaoyong Yuan Qile Zhu","year":"2017","unstructured":"Qile Zhu Xiaolin Li Xiaoyong Yuan, Pan He. 2017. Adversarial Examples: Attacks and Defenses for Deep Learning. arXiv:cs.LG\/1712.07107"},{"key":"e_1_3_2_1_18_1","volume-title":"Burges","author":"Yann LeCun Corinna Cortes","year":"1998","unstructured":"Corinna Cortes Yann LeCun and Christopher J.C. Burges. 1998. THE MNIST DATABASE of handwritten digits. http:\/\/data.pymvpa.org\/datasets\/mnist\/"}],"event":{"name":"GLSVLSI '21: Great Lakes Symposium on VLSI 2021","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"Virtual Event USA","acronym":"GLSVLSI '21"},"container-title":["Proceedings of the 2021 Great Lakes Symposium on VLSI"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453688.3461756","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3453688.3461756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:47Z","timestamp":1750195727000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453688.3461756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,22]]},"references-count":18,"alternative-id":["10.1145\/3453688.3461756","10.1145\/3453688"],"URL":"https:\/\/doi.org\/10.1145\/3453688.3461756","relation":{},"subject":[],"published":{"date-parts":[[2021,6,22]]},"assertion":[{"value":"2021-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}