{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:36:30Z","timestamp":1771961790680,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":91,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1937592, 1801865, 2003137"],"award-info":[{"award-number":["1937592, 1801865, 2003137"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,18]]},"DOI":"10.1145\/3466752.3480082","type":"proceedings-article","created":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T19:12:05Z","timestamp":1634497925000},"page":"225-237","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["2-in-1 Accelerator: Enabling Random Precision Switch for Winning Both Adversarial Robustness and Efficiency"],"prefix":"10.1145","author":[{"given":"Yonggan","family":"Fu","sequence":"first","affiliation":[{"name":"Rice University"}]},{"given":"Yang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Rice University, United States of America"}]},{"given":"Qixuan","family":"Yu","sequence":"additional","affiliation":[{"name":"Rice University, United States of America"}]},{"given":"Chaojian","family":"Li","sequence":"additional","affiliation":[{"name":"Rice University, United States of America"}]},{"given":"Yingyan","family":"Lin","sequence":"additional","affiliation":[{"name":"Rice University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. The scaling of MOSFETs Moore\u2019s law and ITRS. http:\/\/userweb.eng.gla.ac.uk\/fikru.adamu-lema\/Chapter_02.pdf  [n. d.]. The scaling of MOSFETs Moore\u2019s law and ITRS. http:\/\/userweb.eng.gla.ac.uk\/fikru.adamu-lema\/Chapter_02.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Machine Learning. PMLR, 274\u2013283","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye , Nicholas Carlini , and David Wagner . 2018 . Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples . In International Conference on Machine Learning. PMLR, 274\u2013283 . Anish Athalye, Nicholas Carlini, and David Wagner. 2018. Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. In International Conference on Machine Learning. PMLR, 274\u2013283."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00356"},{"key":"e_1_3_2_1_6_1","volume-title":"International Conference on Learning Representations.","author":"Buckman Jacob","year":"2018","unstructured":"Jacob Buckman , Aurko Roy , Colin Raffel , and Ian Goodfellow . 2018 . Thermometer encoding: One hot way to resist adversarial examples . In International Conference on Learning Representations. Jacob Buckman, Aurko Roy, Colin Raffel, and Ian Goodfellow. 2018. Thermometer encoding: One hot way to resist adversarial examples. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2019.2950386"},{"key":"e_1_3_2_1_8_1","volume-title":"Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp)","author":"Carlini Nicholas","unstructured":"Nicholas Carlini and David Wagner . 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp) . IEEE , 39\u201357. Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp). IEEE, 39\u201357."},{"key":"e_1_3_2_1_9_1","unstructured":"Anirban Chakraborty Manaar Alam Vishal Dey Anupam Chattopadhyay and Debdeep Mukhopadhyay. 2018. Adversarial attacks and defences: A survey. arXiv preprint arXiv:1810.00069(2018).  Anirban Chakraborty Manaar Alam Vishal Dey Anupam Chattopadhyay and Debdeep Mukhopadhyay. 2018. Adversarial attacks and defences: A survey. arXiv preprint arXiv:1810.00069(2018)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001177"},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Machine Learning. PMLR, 1310\u20131320","author":"Cohen Jeremy","year":"2019","unstructured":"Jeremy Cohen , Elan Rosenfeld , and Zico Kolter . 2019 . Certified adversarial robustness via randomized smoothing . In International Conference on Machine Learning. PMLR, 1310\u20131320 . Jeremy Cohen, Elan Rosenfeld, and Zico Kolter. 2019. Certified adversarial robustness via randomized smoothing. In International Conference on Machine Learning. PMLR, 1310\u20131320."},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Machine Learning. PMLR, 2206\u20132216","author":"Croce Francesco","year":"2020","unstructured":"Francesco Croce and Matthias Hein . 2020 . Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks . In International Conference on Machine Learning. PMLR, 2206\u20132216 . Francesco Croce and Matthias Hein. 2020. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In International Conference on Machine Learning. PMLR, 2206\u20132216."},{"key":"e_1_3_2_1_14_1","volume-title":"Tartan: Accelerating fully-connected and convolutional layers in deep learning networks by exploiting numerical precision variability. arXiv preprint arXiv:1707.09068(2017).","author":"Delmas Alberto","year":"2017","unstructured":"Alberto Delmas , Sayeh Sharify , Patrick Judd , and Andreas Moshovos . 2017 . Tartan: Accelerating fully-connected and convolutional layers in deep learning networks by exploiting numerical precision variability. arXiv preprint arXiv:1707.09068(2017). Alberto Delmas, Sayeh Sharify, Patrick Judd, and Andreas Moshovos. 2017. Tartan: Accelerating fully-connected and convolutional layers in deep learning networks by exploiting numerical precision variability. arXiv preprint arXiv:1707.09068(2017)."},{"key":"e_1_3_2_1_15_1","unstructured":"Guneet\u00a0S Dhillon Kamyar Azizzadenesheli Zachary\u00a0C Lipton Jeremy Bernstein Jean Kossaifi Aran Khanna and Anima Anandkumar. 2018. Stochastic activation pruning for robust adversarial defense. arXiv preprint arXiv:1803.01442(2018).  Guneet\u00a0S Dhillon Kamyar Azizzadenesheli Zachary\u00a0C Lipton Jeremy Bernstein Jean Kossaifi Aran Khanna and Anima Anandkumar. 2018. Stochastic activation pruning for robust adversarial defense. arXiv preprint arXiv:1803.01442(2018)."},{"key":"e_1_3_2_1_16_1","unstructured":"Steven\u00a0K Esser Jeffrey\u00a0L McKinstry Deepika Bablani Rathinakumar Appuswamy and Dharmendra\u00a0S Modha. 2019. Learned step size quantization. arXiv preprint arXiv:1902.08153(2019).  Steven\u00a0K Esser Jeffrey\u00a0L McKinstry Deepika Bablani Rathinakumar Appuswamy and Dharmendra\u00a0S Modha. 2019. Learned step size quantization. arXiv preprint arXiv:1902.08153(2019)."},{"key":"e_1_3_2_1_17_1","unstructured":"Reuben Feinman Ryan\u00a0R Curtin Saurabh Shintre and Andrew\u00a0B Gardner. 2017. Detecting adversarial samples from artifacts. arXiv preprint arXiv:1703.00410(2017).  Reuben Feinman Ryan\u00a0R Curtin Saurabh Shintre and Andrew\u00a0B Gardner. 2017. Detecting adversarial samples from artifacts. arXiv preprint arXiv:1703.00410(2017)."},{"key":"e_1_3_2_1_18_1","volume-title":"CPT: Efficient Deep Neural Network Training via Cyclic Precision. arxiv:cs.LG\/2101.09868","author":"Fu Yonggan","year":"2021","unstructured":"Yonggan Fu , Han Guo , Meng Li , Xin Yang , Yining Ding , Vikas Chandra , and Yingyan Lin . 2021 . CPT: Efficient Deep Neural Network Training via Cyclic Precision. arxiv:cs.LG\/2101.09868 Yonggan Fu, Han Guo, Meng Li, Xin Yang, Yining Ding, Vikas Chandra, and Yingyan Lin. 2021. CPT: Efficient Deep Neural Network Training via Cyclic Precision. arxiv:cs.LG\/2101.09868"},{"key":"e_1_3_2_1_19_1","unstructured":"Yonggan Fu Haoran You Yang Zhao Yue Wang Chaojian Li Kailash Gopalakrishnan Zhangyang Wang and Yingyan Lin. 2020. FracTrain: Fractionally Squeezing Bit Savings Both Temporally and Spatially for Efficient DNN Training. arxiv:cs.CV\/2012.13113  Yonggan Fu Haoran You Yang Zhao Yue Wang Chaojian Li Kailash Gopalakrishnan Zhangyang Wang and Yingyan Lin. 2020. FracTrain: Fractionally Squeezing Bit Savings Both Temporally and Spatially for Efficient DNN Training. arxiv:cs.CV\/2012.13113"},{"key":"e_1_3_2_1_20_1","unstructured":"Yonggan Fu Zhongzhi Yu Yongan Zhang Yifan Jiang Chaojian Li Yongyuan Liang Mingchao Jiang Zhangyang Wang and Yingyan Lin. 2021. InstantNet: Automated Generation and Deployment of Instantaneously Switchable-Precision Networks. arxiv:cs.LG\/2104.10853  Yonggan Fu Zhongzhi Yu Yongan Zhang Yifan Jiang Chaojian Li Yongyuan Liang Mingchao Jiang Zhangyang Wang and Yingyan Lin. 2021. InstantNet: Automated Generation and Deployment of Instantaneously Switchable-Precision Networks. arxiv:cs.LG\/2104.10853"},{"key":"e_1_3_2_1_21_1","unstructured":"Yonggan Fu Yongan Zhang Yang Zhang David Cox and Yingyan Lin. 2021. Auto-NBA: Efficient and Effective Search Over the Joint Space of Networks Bitwidths and Accelerators. arxiv:cs.LG\/2106.06575  Yonggan Fu Yongan Zhang Yang Zhang David Cox and Yingyan Lin. 2021. Auto-NBA: Efficient and Effective Search Over the Joint Space of Networks Bitwidths and Accelerators. arxiv:cs.LG\/2106.06575"},{"key":"e_1_3_2_1_22_1","unstructured":"Angus Galloway Graham\u00a0W Taylor and Medhat Moussa. 2017. Attacking binarized neural networks. arXiv preprint arXiv:1711.00449(2017).  Angus Galloway Graham\u00a0W Taylor and Medhat Moussa. 2017. Attacking binarized neural networks. arXiv preprint arXiv:1711.00449(2017)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00031"},{"key":"e_1_3_2_1_24_1","unstructured":"Ian\u00a0J Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572(2014).  Ian\u00a0J Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572(2014)."},{"key":"e_1_3_2_1_25_1","unstructured":"Luis Guerra Bohan Zhuang Ian Reid and Tom Drummond. 2020. Switchable Precision Neural Networks. arXiv preprint arXiv:2002.02815(2020).  Luis Guerra Bohan Zhuang Ian Reid and Tom Drummond. 2020. Switchable Precision Neural Networks. arXiv preprint arXiv:2002.02815(2020)."},{"key":"e_1_3_2_1_26_1","unstructured":"Shupeng Gui Haotao Wang Chen Yu Haichuan Yang Zhangyang Wang and Ji Liu. 2019. Model compression with adversarial robustness: A unified optimization framework. arXiv preprint arXiv:1902.03538(2019).  Shupeng Gui Haotao Wang Chen Yu Haichuan Yang Zhangyang Wang and Ji Liu. 2019. Model compression with adversarial robustness: A unified optimization framework. arXiv preprint arXiv:1902.03538(2019)."},{"key":"e_1_3_2_1_27_1","volume-title":"International Conference on Machine Learning. PMLR, 2484\u20132493","author":"Guo Chuan","year":"2019","unstructured":"Chuan Guo , Jacob Gardner , Yurong You , Andrew\u00a0Gordon Wilson , and Kilian Weinberger . 2019 . Simple black-box adversarial attacks . In International Conference on Machine Learning. PMLR, 2484\u20132493 . Chuan Guo, Jacob Gardner, Yurong You, Andrew\u00a0Gordon Wilson, and Kilian Weinberger. 2019. Simple black-box adversarial attacks. In International Conference on Machine Learning. PMLR, 2484\u20132493."},{"key":"e_1_3_2_1_28_1","unstructured":"Chuan Guo Mayank Rana Moustapha Cisse and Laurens Van Der\u00a0Maaten. 2017. Countering adversarial images using input transformations. arXiv preprint arXiv:1711.00117(2017).  Chuan Guo Mayank Rana Moustapha Cisse and Laurens Van Der\u00a0Maaten. 2017. Countering adversarial images using input transformations. arXiv preprint arXiv:1711.00117(2017)."},{"key":"e_1_3_2_1_29_1","volume-title":"Hardware Accelerator for Adversarial Attacks on Deep Learning Neural Networks. In 2019 Tenth International Green and Sustainable Computing Conference (IGSC). IEEE, 1\u20138.","author":"Guo Haoqiang","year":"2019","unstructured":"Haoqiang Guo , Lu Peng , Jian Zhang , Fang Qi , and Lide Duan . 2019 . Hardware Accelerator for Adversarial Attacks on Deep Learning Neural Networks. In 2019 Tenth International Green and Sustainable Computing Conference (IGSC). IEEE, 1\u20138. Haoqiang Guo, Lu Peng, Jian Zhang, Fang Qi, and Lide Duan. 2019. Hardware Accelerator for Adversarial Attacks on Deep Learning Neural Networks. In 2019 Tenth International Green and Sustainable Computing Conference (IGSC). IEEE, 1\u20138."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00068"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.2995347"},{"key":"e_1_3_2_1_32_1","volume-title":"International Conference on Machine Learning. PMLR, 2137\u20132146","author":"Ilyas Andrew","year":"2018","unstructured":"Andrew Ilyas , Logan Engstrom , Anish Athalye , and Jessy Lin . 2018 . Black-box adversarial attacks with limited queries and information . In International Conference on Machine Learning. PMLR, 2137\u20132146 . Andrew Ilyas, Logan Engstrom, Anish Athalye, and Jessy Lin. 2018. Black-box adversarial attacks with limited queries and information. In International Conference on Machine Learning. PMLR, 2137\u20132146."},{"key":"e_1_3_2_1_33_1","unstructured":"Andrew Ilyas Logan Engstrom and Aleksander Madry. 2018. Prior convictions: Black-box adversarial attacks with bandits and priors. arXiv preprint arXiv:1807.07978(2018).  Andrew Ilyas Logan Engstrom and Aleksander Madry. 2018. Prior convictions: Black-box adversarial attacks with bandits and priors. arXiv preprint arXiv:1807.07978(2018)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00286"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00222"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783722"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00448"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2018.8310262"},{"key":"e_1_3_2_1_40_1","unstructured":"Bai Li Changyou Chen Wenlin Wang and Lawrence Carin. 2018. Certified adversarial robustness with additive noise. arXiv preprint arXiv:1809.03113(2018).  Bai Li Changyou Chen Wenlin Wang and Lawrence Carin. 2018. Certified adversarial robustness with additive noise. arXiv preprint arXiv:1809.03113(2018)."},{"key":"e_1_3_2_1_41_1","volume-title":"TIMELY: Pushing Data Movements and Interfaces in PIM Accelerators towards Local and in Time Domain","author":"Li Weitao","year":"2020","unstructured":"Weitao Li , Pengfei Xu , Yang Zhao , Haitong Li , Yuan Xie , and Yingyan Lin . 2020 . TIMELY: Pushing Data Movements and Interfaces in PIM Accelerators towards Local and in Time Domain . IEEE Press , 832\u2013845. https:\/\/doi.org\/10.1109\/ISCA45697.2020.00073 10.1109\/ISCA45697.2020.00073 Weitao Li, Pengfei Xu, Yang Zhao, Haitong Li, Yuan Xie, and Yingyan Lin. 2020. TIMELY: Pushing Data Movements and Interfaces in PIM Accelerators towards Local and in Time Domain. IEEE Press, 832\u2013845. https:\/\/doi.org\/10.1109\/ISCA45697.2020.00073"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"key":"e_1_3_2_1_43_1","unstructured":"Ji Lin Chuang Gan and Song Han. 2019. Defensive quantization: When efficiency meets robustness. arXiv preprint arXiv:1904.08444(2019).  Ji Lin Chuang Gan and Song Han. 2019. Defensive quantization: When efficiency meets robustness. arXiv preprint arXiv:1904.08444(2019)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050797"},{"key":"e_1_3_2_1_45_1","volume-title":"Variation-Tolerant Architectures for Convolutional Neural Networks in the Near Threshold Voltage Regime. In 2016 IEEE International Workshop on Signal Processing Systems (SiPS). 17\u201322","author":"Lin Yingyan","year":"2016","unstructured":"Yingyan Lin , Sai Zhang , and Naresh\u00a0 R. Shanbhag . 2016 . Variation-Tolerant Architectures for Convolutional Neural Networks in the Near Threshold Voltage Regime. In 2016 IEEE International Workshop on Signal Processing Systems (SiPS). 17\u201322 . https:\/\/doi.org\/10.1109\/SiPS.2016.11 10.1109\/SiPS.2016.11 Yingyan Lin, Sai Zhang, and Naresh\u00a0R. Shanbhag. 2016. Variation-Tolerant Architectures for Convolutional Neural Networks in the Near Threshold Voltage Regime. In 2016 IEEE International Workshop on Signal Processing Systems (SiPS). 17\u201322. https:\/\/doi.org\/10.1109\/SiPS.2016.11"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210337"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_23"},{"key":"e_1_3_2_1_48_1","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083(2017).  Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083(2017)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"e_1_3_2_1_50_1","unstructured":"Jan\u00a0Hendrik Metzen Tim Genewein Volker Fischer and Bastian Bischoff. 2017. On detecting adversarial perturbations. arXiv preprint arXiv:1702.04267(2017).  Jan\u00a0Hendrik Metzen Tim Genewein Volker Fischer and Bastian Bischoff. 2017. On detecting adversarial perturbations. arXiv preprint arXiv:1702.04267(2017)."},{"key":"e_1_3_2_1_51_1","volume-title":"Genetic algorithms, tournament selection, and the effects of noise. Complex systems 9, 3","author":"Miller L","year":"1995","unstructured":"Brad\u00a0 L Miller , David\u00a0 E Goldberg , 1995. Genetic algorithms, tournament selection, and the effects of noise. Complex systems 9, 3 ( 1995 ), 193\u2013212. Brad\u00a0L Miller, David\u00a0E Goldberg, 1995. Genetic algorithms, tournament selection, and the effects of noise. Complex systems 9, 3 (1995), 193\u2013212."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927038"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2016.7573525"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3370748.3406585"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919463"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_1_59_1","volume-title":"PROFIT: A Novel Training Method for sub-4-bit MobileNet Models. arXiv preprint arXiv:2008.04693(2020).","author":"Park Eunhyeok","year":"2020","unstructured":"Eunhyeok Park and Sungjoo Yoo . 2020 . PROFIT: A Novel Training Method for sub-4-bit MobileNet Models. arXiv preprint arXiv:2008.04693(2020). Eunhyeok Park and Sungjoo Yoo. 2020. PROFIT: A Novel Training Method for sub-4-bit MobileNet Models. arXiv preprint arXiv:2008.04693(2020)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2020.2998457"},{"key":"e_1_3_2_1_61_1","unstructured":"Adnan\u00a0Siraj Rakin Jinfeng Yi Boqing Gong and Deliang Fan. 2018. Defend deep neural networks against adversarial examples via fixed and dynamic quantized activation functions. arXiv preprint arXiv:1807.06714(2018).  Adnan\u00a0Siraj Rakin Jinfeng Yi Boqing Gong and Deliang Fan. 2018. Defend deep neural networks against adversarial examples via fixed and dynamic quantized activation functions. arXiv preprint arXiv:1807.06714(2018)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240791"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317784"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7965844"},{"key":"e_1_3_2_1_65_1","unstructured":"Ali Shafahi Mahyar Najibi Amin Ghiasi Zheng Xu John Dickerson Christoph Studer Larry\u00a0S Davis Gavin Taylor and Tom Goldstein. 2019. Adversarial training for free!arXiv preprint arXiv:1904.12843(2019).  Ali Shafahi Mahyar Najibi Amin Ghiasi Zheng Xu John Dickerson Christoph Studer Larry\u00a0S Davis Gavin Taylor and Tom Goldstein. 2019. Adversarial training for free!arXiv preprint arXiv:1904.12843(2019)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465915"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00069"},{"key":"e_1_3_2_1_68_1","unstructured":"Moran Shkolnik Brian Chmiel Ron Banner Gil Shomron Yuri Nahshan Alex Bronstein and Uri Weiser. 2020. Robust quantization: One model to rule them all. arXiv preprint arXiv:2002.07686(2020).  Moran Shkolnik Brian Chmiel Ron Banner Gil Shomron Yuri Nahshan Alex Bronstein and Uri Weiser. 2020. Robust quantization: One model to rule them all. arXiv preprint arXiv:2002.07686(2020)."},{"key":"e_1_3_2_1_69_1","unstructured":"Chang Song Elias Fallon and Hai Li. 2020. Improving Adversarial Robustness in Weight-quantized Neural Networks. arXiv preprint arXiv:2012.14965(2020).  Chang Song Elias Fallon and Hai Li. 2020. Improving Adversarial Robustness in Weight-quantized Neural Networks. arXiv preprint arXiv:2012.14965(2020)."},{"key":"e_1_3_2_1_70_1","volume-title":"Feedback Learning for Improving the Robustness of Neural Networks. In 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA). IEEE, 686\u2013693","author":"Song Chang","year":"2019","unstructured":"Chang Song , Zuoguan Wang , and Hai Li . 2019 . Feedback Learning for Improving the Robustness of Neural Networks. In 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA). IEEE, 686\u2013693 . Chang Song, Zuoguan Wang, and Hai Li. 2019. Feedback Learning for Improving the Robustness of Neural Networks. In 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA). IEEE, 686\u2013693."},{"key":"e_1_3_2_1_71_1","volume-title":"Pixeldefend: Leveraging generative models to understand and defend against adversarial examples. arXiv preprint arXiv:1710.10766(2017).","author":"Song Yang","year":"2017","unstructured":"Yang Song , Taesup Kim , Sebastian Nowozin , Stefano Ermon , and Nate Kushman . 2017 . Pixeldefend: Leveraging generative models to understand and defend against adversarial examples. arXiv preprint arXiv:1710.10766(2017). Yang Song, Taesup Kim, Sebastian Nowozin, Stefano Ermon, and Nate Kushman. 2017. Pixeldefend: Leveraging generative models to understand and defend against adversarial examples. arXiv preprint arXiv:1710.10766(2017)."},{"key":"e_1_3_2_1_72_1","unstructured":"Thilo Strauss Markus Hanselmann Andrej Junginger and Holger Ulmer. 2017. Ensemble methods as a defense to adversarial perturbations against deep neural networks. arXiv preprint arXiv:1709.03423(2017).  Thilo Strauss Markus Hanselmann Andrej Junginger and Holger Ulmer. 2017. Ensemble methods as a defense to adversarial perturbations against deep neural networks. arXiv preprint arXiv:1709.03423(2017)."},{"key":"e_1_3_2_1_73_1","unstructured":"Synopsys. [n. d.]. PrimeTime PX: Signoff Power Analysis. https:\/\/www.synopsys.com\/support\/training\/signoff\/primetimepx-fcd.html accessed 2019-08-06.  Synopsys. [n. d.]. PrimeTime PX: Signoff Power Analysis. https:\/\/www.synopsys.com\/support\/training\/signoff\/primetimepx-fcd.html accessed 2019-08-06."},{"key":"e_1_3_2_1_74_1","unstructured":"Florian Tramer Nicholas Carlini Wieland Brendel and Aleksander Madry. 2020. On adaptive attacks to adversarial example defenses. arXiv preprint arXiv:2002.08347(2020).  Florian Tramer Nicholas Carlini Wieland Brendel and Aleksander Madry. 2020. On adaptive attacks to adversarial example defenses. arXiv preprint arXiv:2002.08347(2020)."},{"key":"e_1_3_2_1_75_1","unstructured":"Florian Tram\u00e8r Alexey Kurakin Nicolas Papernot Ian Goodfellow Dan Boneh and Patrick McDaniel. 2017. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204(2017).  Florian Tram\u00e8r Alexey Kurakin Nicolas Papernot Ian Goodfellow Dan Boneh and Patrick McDaniel. 2017. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204(2017)."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378532"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.2979669"},{"key":"e_1_3_2_1_78_1","volume-title":"International Conference on Learning Representations.","author":"Wong Eric","year":"2019","unstructured":"Eric Wong , Leslie Rice , and J\u00a0Zico Kolter . 2019 . Fast is better than free: Revisiting adversarial training . In International Conference on Learning Representations. Eric Wong, Leslie Rice, and J\u00a0Zico Kolter. 2019. Fast is better than free: Revisiting adversarial training. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_79_1","volume-title":"Adversarial Weight Perturbation Helps Robust Generalization. Advances in Neural Information Processing Systems 33","author":"Wu Dongxian","year":"2020","unstructured":"Dongxian Wu , Shu-Tao Xia , and Yisen Wang . 2020. Adversarial Weight Perturbation Helps Robust Generalization. Advances in Neural Information Processing Systems 33 ( 2020 ). Dongxian Wu, Shu-Tao Xia, and Yisen Wang. 2020. Adversarial Weight Perturbation Helps Robust Generalization. Advances in Neural Information Processing Systems 33 (2020)."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00090"},{"key":"e_1_3_2_1_81_1","unstructured":"Cihang Xie Jianyu Wang Zhishuai Zhang Zhou Ren and Alan Yuille. 2017. Mitigating adversarial effects through randomization. arXiv preprint arXiv:1711.01991(2017).  Cihang Xie Jianyu Wang Zhishuai Zhang Zhou Ren and Alan Yuille. 2017. Mitigating adversarial effects through randomization. arXiv preprint arXiv:1711.01991(2017)."},{"key":"e_1_3_2_1_82_1","volume-title":"AutoDNNchip: An Automated DNN Chip Predictor and Builder for Both FPGAs and ASICs(FPGA \u201920)","author":"Xu Pengfei","unstructured":"Pengfei Xu , Xiaofan Zhang , Cong Hao , Yang Zhao , Yongan Zhang , Yue Wang , Chaojian Li , Zetong Guan , Deming Chen , and Yingyan Lin . 2020. AutoDNNchip: An Automated DNN Chip Predictor and Builder for Both FPGAs and ASICs(FPGA \u201920) . Association for Computing Machinery , New York, NY, USA , 40\u201350. https:\/\/doi.org\/10.1145\/3373087.3375306 10.1145\/3373087.3375306 Pengfei Xu, Xiaofan Zhang, Cong Hao, Yang Zhao, Yongan Zhang, Yue Wang, Chaojian Li, Zetong Guan, Deming Chen, and Yingyan Lin. 2020. AutoDNNchip: An Automated DNN Chip Predictor and Builder for Both FPGAs and ASICs(FPGA \u201920). Association for Computing Machinery, New York, NY, USA, 40\u201350. https:\/\/doi.org\/10.1145\/3373087.3375306"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373087.3375306"},{"key":"e_1_3_2_1_84_1","unstructured":"Weilin Xu David Evans and Yanjun Qi. 2017. Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155(2017).  Weilin Xu David Evans and Yanjun Qi. 2017. Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155(2017)."},{"key":"e_1_3_2_1_85_1","unstructured":"Haoran You Chaojian Li Pengfei Xu Yonggan Fu Yue Wang Xiaohan Chen Richard\u00a0G. Baraniuk Zhangyang Wang and Yingyan Lin. 2020. Drawing early-bird tickets: Towards more efficient training of deep networks. arxiv:cs.LG\/1909.11957  Haoran You Chaojian Li Pengfei Xu Yonggan Fu Yue Wang Xiaohan Chen Richard\u00a0G. Baraniuk Zhangyang Wang and Yingyan Lin. 2020. Drawing early-bird tickets: Towards more efficient training of deep networks. arxiv:cs.LG\/1909.11957"},{"key":"e_1_3_2_1_86_1","volume-title":"DNA: Differentiable Network-Accelerator Co-Search. arxiv:cs.LG\/2010.14778","author":"Zhang Yongan","year":"2020","unstructured":"Yongan Zhang , Yonggan Fu , Weiwen Jiang , Chaojian Li , Haoran You , Meng Li , Vikas Chandra , and Yingyan Lin . 2020 . DNA: Differentiable Network-Accelerator Co-Search. arxiv:cs.LG\/2010.14778 Yongan Zhang, Yonggan Fu, Weiwen Jiang, Chaojian Li, Haoran You, Meng Li, Vikas Chandra, and Yingyan Lin. 2020. DNA: Differentiable Network-Accelerator Co-Search. arxiv:cs.LG\/2010.14778"},{"key":"e_1_3_2_1_87_1","volume-title":"DIAN: Differentiable Accelerator-Network Co-Search Towards Maximal DNN Efficiency. In 2021 IEEE\/ACM International Symposium on Low Power Electronics and Design (ISLPED). 1\u20136. https:\/\/doi.org\/10","author":"Zhang Yongan","year":"2021","unstructured":"Yongan Zhang , Yonggan Fu , Weiwen Jiang , Chaojian Li , Haoran You , Meng Li , Vikas Chandra , and Yingyan Lin . 2021 . DIAN: Differentiable Accelerator-Network Co-Search Towards Maximal DNN Efficiency. In 2021 IEEE\/ACM International Symposium on Low Power Electronics and Design (ISLPED). 1\u20136. https:\/\/doi.org\/10 .1109\/ISLPED52811.2021.9502478 10.1109\/ISLPED52811.2021.9502478 Yongan Zhang, Yonggan Fu, Weiwen Jiang, Chaojian Li, Haoran You, Meng Li, Vikas Chandra, and Yingyan Lin. 2021. DIAN: Differentiable Accelerator-Network Co-Search Towards Maximal DNN Efficiency. In 2021 IEEE\/ACM International Symposium on Low Power Electronics and Design (ISLPED). 1\u20136. https:\/\/doi.org\/10.1109\/ISLPED52811.2021.9502478"},{"key":"e_1_3_2_1_88_1","volume-title":"SmartExchange: Trading Higher-Cost Memory Storage\/Access for Lower-Cost Computation","author":"Zhao Yang","year":"2020","unstructured":"Yang Zhao , Xiaohan Chen , Yue Wang , Chaojian Li , Haoran You , Yonggan Fu , Yuan Xie , Zhangyang Wang , and Yingyan Lin . 2020. SmartExchange: Trading Higher-Cost Memory Storage\/Access for Lower-Cost Computation . IEEE Press , 954\u2013967. https:\/\/doi.org\/10.1109\/ISCA45697. 2020 .00082 10.1109\/ISCA45697.2020.00082 Yang Zhao, Xiaohan Chen, Yue Wang, Chaojian Li, Haoran You, Yonggan Fu, Yuan Xie, Zhangyang Wang, and Yingyan Lin. 2020. SmartExchange: Trading Higher-Cost Memory Storage\/Access for Lower-Cost Computation. IEEE Press, 954\u2013967. https:\/\/doi.org\/10.1109\/ISCA45697.2020.00082"},{"key":"#cr-split#-e_1_3_2_1_89_1.1","doi-asserted-by":"crossref","unstructured":"Yang Zhao Chaojian Li Yue Wang Pengfei Xu Yongan Zhang and Yingyan Lin. 2020. DNN-Chip Predictor: An Analytical Performance Predictor for DNN Accelerators with Various Dataflows and Hardware Architectures. In ICASSP 2020 - 2020 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). 1593-1597. https:\/\/doi.org\/10.1109\/ICASSP40776.2020.9053977 10.1109\/ICASSP40776.2020.9053977","DOI":"10.1109\/ICASSP40776.2020.9053977"},{"key":"#cr-split#-e_1_3_2_1_89_1.2","doi-asserted-by":"crossref","unstructured":"Yang Zhao Chaojian Li Yue Wang Pengfei Xu Yongan Zhang and Yingyan Lin. 2020. DNN-Chip Predictor: An Analytical Performance Predictor for DNN Accelerators with Various Dataflows and Hardware Architectures. In ICASSP 2020 - 2020 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). 1593-1597. https:\/\/doi.org\/10.1109\/ICASSP40776.2020.9053977","DOI":"10.1109\/ICASSP40776.2020.9053977"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"crossref","unstructured":"Yang Zhao Chaojian Li Yue Wang Pengfei Xu Yongan Zhang and Yingyan Lin. 2020. DNN-Chip Predictor: An Analytical Performance Predictor for DNN Accelerators with Various Dataflows and Hardware Architectures. arxiv:cs.LG\/2002.11270  Yang Zhao Chaojian Li Yue Wang Pengfei Xu Yongan Zhang and Yingyan Lin. 2020. DNN-Chip Predictor: An Analytical Performance Predictor for DNN Accelerators with Various Dataflows and Hardware Architectures. arxiv:cs.LG\/2002.11270","DOI":"10.1109\/ICASSP40776.2020.9053977"}],"event":{"name":"MICRO '21: 54th Annual IEEE\/ACM International Symposium on Microarchitecture","location":"Virtual Event Greece","acronym":"MICRO '21","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["MICRO-54: 54th Annual IEEE\/ACM International Symposium on Microarchitecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466752.3480082","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3466752.3480082","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466752.3480082","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466752.3480082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:56Z","timestamp":1750191536000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466752.3480082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":91,"alternative-id":["10.1145\/3466752.3480082","10.1145\/3466752"],"URL":"https:\/\/doi.org\/10.1145\/3466752.3480082","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"2021-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}