{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:14Z","timestamp":1750219994292,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,30]]},"DOI":"10.1145\/3508352.3561099","type":"proceedings-article","created":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T12:10:54Z","timestamp":1671711054000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Stochastic Mixed-Signal Circuit Design for In-Sensor Privacy"],"prefix":"10.1145","author":[{"given":"Ningyuan","family":"Cao","sequence":"first","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Jianbo","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Boyang","family":"Cheng","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Muya","family":"Chang","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]}],"member":"320","published-online":{"date-parts":[[2022,12,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000560"},{"key":"e_1_3_2_1_2_1","first-page":"4450","volume-title":"An Energy-Efficient Reconfigurable LSTM Accelerator for Natural Language Processing,\" in 2019 IEEE International Conference on Big Data (Big Data)","author":"Azari E.","year":"2019","unstructured":"E. Azari and S. Vrudhula, \"An Energy-Efficient Reconfigurable LSTM Accelerator for Natural Language Processing,\" in 2019 IEEE International Conference on Big Data (Big Data), pp. 4450--4459, Dec. 2019."},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"Homeland Security Video Surveillance System for Smart Cities,\" in 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","author":"Ismail Y.","year":"2018","unstructured":"Y. Ismail, M. Hammad, and W. El-Medany, \"Homeland Security Video Surveillance System for Smart Cities,\" in 2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), pp. 1--4, Nov. 2018."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045078"},{"key":"e_1_3_2_1_5_1","first-page":"07646","article-title":"A survey of privacy attacks in machine learning","volume":"2007","author":"Rigaki M.","year":"2020","unstructured":"M. Rigaki and S. Garc\u00eda, \"A survey of privacy attacks in machine learning,\" ArXiv, vol. abs\/2007.07646, 2020.","journal-title":"ArXiv"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2902799"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"A 55nm 50nJ\/encode 13nJ\/decode Homomorphic Encryption Crypto-Engine for IoT Nodes to Enable Secure Computation on Encrypted Data,\" in 2019 IEEE Custom Integrated Circuits Conference (CICC)","author":"Yoon I.","year":"2019","unstructured":"I. Yoon, N. Cao, A. Amaravati, and A. Raychowdhury, \"A 55nm 50nJ\/encode 13nJ\/decode Homomorphic Encryption Crypto-Engine for IoT Nodes to Enable Secure Computation on Encrypted Data,\" in 2019 IEEE Custom Integrated Circuits Conference (CICC), pp. 1--4, Apr. 2019."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"e_1_3_2_1_9_1","volume-title":"Apr.","author":"Gupta S.","year":"2022","unstructured":"S. Gupta, R. Cammarota, and T. Rosing, \"MemFHE: End-to-End Computing with Fully Homomorphic Encryption in Memory,\" arXiv:2204.12557 [cs], Apr. 2022. arXiv: 2204.12557."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737966"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Prive-hd: Privacy-preserved hyperdimensional computing,\" in 2020 57th ACM\/IEEE Design Automation Conference (DAC)","author":"Khaleghi B.","year":"2020","unstructured":"B. Khaleghi, M. Imani, and T. Rosing, \"Prive-hd: Privacy-preserved hyperdimensional computing,\" in 2020 57th ACM\/IEEE Design Automation Conference (DAC), pp. 1--6, 2020."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101570"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113380"},{"key":"e_1_3_2_1_14_1","first-page":"186","volume-title":"Privacy-Utility Tradeoff of Linear Regression under Random Projections and Additive Noise,\" 2018 IEEE International Symposium on Information Theory (ISIT)","author":"Showkatbakhsh M.","year":"2018","unstructured":"M. Showkatbakhsh, C. Karakus, and S. Diggavi, \"Privacy-Utility Tradeoff of Linear Regression under Random Projections and Additive Noise,\" 2018 IEEE International Symposium on Information Theory (ISIT), pp. 186--190, June 2018. arXiv: 1902.04688."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3022358"},{"key":"e_1_3_2_1_18_1","first-page":"685","volume-title":"Adaptive DNN Partition in Edge Computing Environments,\" in 2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)","author":"Miao W.","year":"2020","unstructured":"W. Miao, Z. Zeng, L. Wei, S. Li, C. Jiang, and Z. Zhang, \"Adaptive DNN Partition in Edge Computing Environments,\" in 2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS), pp. 685--690, Dec. 2020."},{"key":"e_1_3_2_1_19_1","unstructured":"\"General Data Protection Regulation (GDPR) Compliance Guidelines gdpr.eu..\" [online] Available: https:\/\/gdpr.eu\/ [Accessed 10-May-2022]."},{"key":"e_1_3_2_1_20_1","unstructured":"\"Privacy by Design.\" [online] Available: https:\/\/gdpr-info.eu\/issues\/privacy-by-design\/ [Accessed 10-May-2022]."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"J. Zouari M. Hamdi and T.-H. Kim \"A privacy-preserving homomorphic encryption scheme for the Internet of Things \" in 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) pp. 1939--1944 June 2017.","DOI":"10.1109\/IWCMC.2017.7986580"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2018.2869150"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/A-SSCC47793.2019.9056945"},{"key":"e_1_3_2_1_24_1","first-page":"346","volume-title":"A 1W voice activity detector using analog feature extraction and digital deep neural network,\" in 2018 IEEE International Solid - State Circuits Conference - (ISSCC)","author":"Yang M.","year":"2018","unstructured":"M. Yang, C.-H. Yeh, Y. Zhou, J. P. Cerqueira, A. A. Lazar, and M. Seok, \"A 1W voice activity detector using analog feature extraction and digital deep neural network,\" in 2018 IEEE International Solid - State Circuits Conference - (ISSCC), pp. 346--348, Feb. 2018."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"N. Cao M. Chang and A. Raychowdhury \"14.1 A 65nm 1.1-to-9.1TOPS\/W Hybrid-Digital-Mixed-Signal Computing Platform for Accelerating Model-Based and Model-Free Swarm Robotics \" in 2019 IEEE International Solid- State Circuits Conference - (ISSCC) pp. 222--224 Feb. 2019. ISSN: 2376-8606.","DOI":"10.1109\/ISSCC.2019.8662311"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3441303"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1400123.1400129"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2014.2334852"},{"key":"e_1_3_2_1_29_1","first-page":"1","article-title":"A 65-nm 8-to-3-b 1.0-0.36-V 9.1-1.1-TOPS\/W Hybrid-Digital-Mixed-Signal Computing Platform for Accelerating Swarm Robotics","author":"Cao N.","year":"2019","unstructured":"N. Cao, M. Chang, and A. Raychowdhury, \"A 65-nm 8-to-3-b 1.0-0.36-V 9.1-1.1-TOPS\/W Hybrid-Digital-Mixed-Signal Computing Platform for Accelerating Swarm Robotics,\" IEEE Journal of Solid-State Circuits, pp. 1--11, 2019.","journal-title":"IEEE Journal of Solid-State Circuits"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2020.3027801"},{"key":"e_1_3_2_1_31_1","first-page":"498","volume-title":"36.1 Unified In-Memory Dynamic TRNG and Multi-Bit Static PUF Entropy Generation for Ubiquitous Hardware Security,\" in 2021 IEEE International Solid- State Circuits Conference (ISSCC)","author":"Taneja S.","year":"2021","unstructured":"S. Taneja, V. K. Rajanna, and M. Alioto, \"36.1 Unified In-Memory Dynamic TRNG and Multi-Bit Static PUF Entropy Generation for Ubiquitous Hardware Security,\" in 2021 IEEE International Solid- State Circuits Conference (ISSCC), vol. 64, pp. 498--500, Feb. 2021."},{"key":"e_1_3_2_1_32_1","first-page":"1370","volume-title":"Communication Technology (RTEICT)","author":"Batabyal S.","year":"2019","unstructured":"S. Batabyal and A. A. Bazil Rai, \"Design of A Ring Oscillator Based PUF with Enhanced Challenge Response pair and Improved Reliability,\" in 2019 4th International Conference on Recent Trends on Electronics, Information, Communication Technology (RTEICT), pp. 1370--1374, May 2019."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"J. Park and J.-Y. Sim \"36.4 A Physically Unclonable Function Combining a Process Mismatch Amplifier in an Oscillator Collapse Topology \" in 2021 IEEE International Solid- State Circuits Conference (ISSCC) vol. 64 pp. 504--506 Feb. 2021.","DOI":"10.1109\/ISSCC42613.2021.9365829"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Y. Pang B. Gao D. Wu S. Yi Q. Liu W.-H. Chen T.-W. Chang W.-E. Lin X. Sun S. Yu H. Qian M.-F. Chang and H. Wu \"25.2 A Reconfigurable RRAM Physically Unclonable Function Utilizing Post-Process Randomness Source With &lt;6X106 Native Bit Error Rate \" in 2019 IEEE International Solid- State Circuits Conference - (ISSCC) pp. 402--404 Feb. 2019. ISSN: 2376-8606.","DOI":"10.1109\/ISSCC.2019.8662307"},{"key":"e_1_3_2_1_36_1","first-page":"1","volume-title":"Security of emerging non-volatile memories: Attacks and defenses,\" in 2016 IEEE 34th VLSI Test Symposium (VTS)","author":"Shamsi K.","year":"2016","unstructured":"K. Shamsi and Y. Jin, \"Security of emerging non-volatile memories: Attacks and defenses,\" in 2016 IEEE 34th VLSI Test Symposium (VTS), pp. 1--4, Apr. 2016."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"A. Amravati S. B. Nasir S. Thangadurai I. Yoon and A. Raychowdhury \"A 55nm time-domain mixed-signal neuromorphic accelerator with stochastic synapses and embedded reinforcement learning for autonomous micro-robots \" in 2018 IEEE International Solid - State Circuits Conference - (ISSCC) pp. 124--126 Feb. 2018.","DOI":"10.1109\/ISSCC.2018.8310215"},{"key":"e_1_3_2_1_38_1","first-page":"1","volume-title":"Analysis of threshold voltage variation using stacked-FET power amplifiers,\" in 2014 9th International Conference on Industrial and Information Systems (ICIIS)","author":"Handa M.","year":"2014","unstructured":"M. Handa, H. Bhasin, S. Dwari, S. Kumar, and B. K. Kanaujia, \"Analysis of threshold voltage variation using stacked-FET power amplifiers,\" in 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp. 1--4, 2014."}],"event":{"name":"ICCAD '22: IEEE\/ACM International Conference on Computer-Aided Design","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-EDS Electronic Devices Society","IEEE CAS","IEEE CEDA"],"location":"San Diego California","acronym":"ICCAD '22"},"container-title":["Proceedings of the 41st IEEE\/ACM International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508352.3561099","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508352.3561099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:36Z","timestamp":1750182576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508352.3561099"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,30]]},"references-count":37,"alternative-id":["10.1145\/3508352.3561099","10.1145\/3508352"],"URL":"https:\/\/doi.org\/10.1145\/3508352.3561099","relation":{},"subject":[],"published":{"date-parts":[[2022,10,30]]},"assertion":[{"value":"2022-12-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}