{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T18:49:06Z","timestamp":1767811746357,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T00:00:00Z","timestamp":1673827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,16]]},"DOI":"10.1145\/3566097.3567896","type":"proceedings-article","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T18:40:49Z","timestamp":1675190449000},"page":"252-257","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Rethink before Releasing Your Model"],"prefix":"10.1145","author":[{"given":"Chen-Chia","family":"Chang","sequence":"first","affiliation":[{"name":"Duke University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jingyu","family":"Pan","sequence":"additional","affiliation":[{"name":"Duke University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhiyao","family":"Xie","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiang","family":"Hu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yiran","family":"Chen","sequence":"additional","affiliation":[{"name":"Duke University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. NanGate 45nm Open Cell Library. https:\/\/si2.org\/open-cell-library\/"},{"key":"e_1_3_2_1_2_1","volume-title":"IWLS 2005 benchmarks. In International Workshop for Logic Synthesis (IWLS): http:\/\/www.iwls.org.","author":"Albrecht Christoph","year":"2005","unstructured":"Christoph Albrecht. 2005. IWLS 2005 benchmarks. In International Workshop for Logic Synthesis (IWLS): http:\/\/www.iwls.org."},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE International Symposium on Circuits and Systems (ISCAS). IEEE","author":"Franc","unstructured":"Franc Brglez et al. 1989. Combinational profiles of sequential benchmark circuits. In IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 1929--1934."},{"key":"e_1_3_2_1_4_1","volume-title":"ISPD 2015 benchmarks with fence regions and routing blockages for detailed-routing-driven placement. In Proceedings of the 2015 Symposium on International Symposium on Physical Design. 157--164","author":"Ismail","unstructured":"Ismail S Bustany et al. 2015. ISPD 2015 benchmarks with fence regions and routing blockages for detailed-routing-driven placement. In Proceedings of the 2015 Symposium on International Symposium on Physical Design. 157--164."},{"key":"e_1_3_2_1_5_1","unstructured":"Cadence. 2021. Cadence Cerebrus Intelligent Chip Explorer. https:\/\/www.cadence.com\/en_US\/home\/tools\/digital-design-and-signoff\/soc-implementation-and-floorplanning\/cerebrus-intelligent-chip-explorer.html"},{"key":"e_1_3_2_1_6_1","unstructured":"Cadence. 2021. Innovus Implementation System. https:\/\/www.cadence.com\/en_US\/home\/tools\/digital-design-and-signoff\/soc-implementation-and-floorplanning\/innovus-implementation-system.html"},{"key":"e_1_3_2_1_7_1","volume-title":"Automatic Routability Predictor Development Using Neural Architecture Search. In 2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD). IEEE, 1--9.","author":"Chen-Chia","unstructured":"Chen-Chia Chang et al. 2021. Automatic Routability Predictor Development Using Neural Architecture Search. In 2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD). IEEE, 1--9."},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference On Computer Aided Design (ICCAD). IEEE.","author":"Jingsong","unstructured":"Jingsong Chen et al. 2020. PROS: A plug-in for routability optimization applied in the state-of-the-art commercial eda tool using deep learning. In International Conference On Computer Aided Design (ICCAD). IEEE."},{"key":"e_1_3_2_1_9_1","volume-title":"Matteo Sonza Reorda, and Giovanni Squillero","author":"Corno Fulvio","year":"2000","unstructured":"Fulvio Corno, Matteo Sonza Reorda, and Giovanni Squillero. 2000. RT-level ITC'99 benchmarks and first ATPG results. Design & Test of computers (2000)."},{"key":"e_1_3_2_1_10_1","volume-title":"international conference on machine learning. PMLR, 1050--1059","author":"Gal Yarin","year":"2016","unstructured":"Yarin Gal and Zoubin Ghahramani. 2016. Dropout as a bayesian approximation: Representing model uncertainty in deep learning. In international conference on machine learning. PMLR, 1050--1059."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3451179"},{"key":"e_1_3_2_1_12_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE.","author":"Huang Yu-Hung","year":"2019","unstructured":"Yu-Hung Huang, Zhiyao Xie, Guan-Qi Fang, Tao-Chun Yu, Haoxing Ren, Shao-Yun Fang, Yiran Chen, and Jiang Hu. 2019. Routability-driven macro placement with embedded cnn-based prediction model. In Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE."},{"key":"e_1_3_2_1_13_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Jagielski Matthew","year":"2020","unstructured":"Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, and Nicolas Papernot. 2020. High accuracy and high fidelity extraction of neural networks. In 29th USENIX Security Symposium (USENIX Security 20). 1345--1362."},{"key":"e_1_3_2_1_14_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_15_1","unstructured":"Kalpesh Krishna et al. 2019. Thieves on sesame street! model extraction of bert-based apis. arXiv preprint arXiv:1910.12366 (2019)."},{"key":"e_1_3_2_1_16_1","volume-title":"Workshop on challenges in representation learning, ICML","volume":"3","author":"Dong-Hyun","unstructured":"Dong-Hyun Lee et al. 2013. Pseudo-label: The simple and efficient semi-supervised learning method for deep neural networks. In Workshop on challenges in representation learning, ICML, Vol. 3. 896."},{"key":"e_1_3_2_1_17_1","volume-title":"International Symposium on Physical Design (ISPD).","author":"Rongjian","unstructured":"Rongjian Liang et al. 2020. DRC hotspot prediction at sub-10nm process nodes using customized convolutional network. In International Symposium on Physical Design (ISPD)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408288"},{"key":"e_1_3_2_1_19_1","unstructured":"Microsoft. 2021. Microsoft Azure. https:\/\/azure.microsoft.com\/services\/machine-learning"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 4954--4963","author":"Tribhuvanesh","unstructured":"Tribhuvanesh Orekondy et al. 2019. Knockoff nets: Stealing functionality of black-box models. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 4954--4963."},{"key":"e_1_3_2_1_21_1","volume-title":"International Symposium on Intelligent Data Analysis. Springer, 309--318","author":"Tobias","unstructured":"Tobias Scheffer et al. 2001. Active hidden markov models for information extraction. In International Symposium on Intelligent Data Analysis. Springer, 309--318."},{"key":"e_1_3_2_1_22_1","unstructured":"Burr Settles. 2009. Active learning literature survey. (2009)."},{"key":"e_1_3_2_1_23_1","volume-title":"A mathematical theory of communication. ACM SIGMOBILE mobile computing and communications review 5, 1","author":"Shannon Claude Elwood","year":"2001","unstructured":"Claude Elwood Shannon. 2001. A mathematical theory of communication. ACM SIGMOBILE mobile computing and communications review 5, 1 (2001), 3--55."},{"key":"e_1_3_2_1_24_1","unstructured":"Synopsys. 2021. Design Compiler Implementation System. https:\/\/www.synopsys.com\/implementation-and-signoff\/rtl-synthesis-test\/dc-ultra.html"},{"key":"e_1_3_2_1_25_1","unstructured":"Synopsys. 2021. DSO.ai: AI-Driven Design Applications. https:\/\/www.synopsys.com\/implementation-and-signoff\/ml-ai-design\/dso-ai.html"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-019-05855-6"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2589879"},{"key":"e_1_3_2_1_28_1","volume-title":"IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE.","author":"Zhiyao","unstructured":"Zhiyao Xie et al. 2018. RouteNet: Routability prediction for mixed-size designs using convolutional neural network. In IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE."},{"key":"e_1_3_2_1_29_1","unstructured":"Zhiyao Xie et al. 2022. The Dark Side: Security Concerns in Machine Learning for EDA. arXiv preprint arXiv:2203.10597 (2022)."},{"key":"e_1_3_2_1_30_1","volume-title":"2021 26th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 885--891","author":"Haoyu","unstructured":"Haoyu Yang et al. 2021. Attacking a CNN-based Layout Hotspot Detector Using Group Gradient Method. In 2021 26th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 885--891."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317876"},{"key":"e_1_3_2_1_32_1","volume-title":"ACM\/IEEE Design Automation Conference.","author":"Yu C.","unstructured":"C. Yu and Z. Zhang. 2019. Painting on placement: forecasting routing congestion using conditional generative adversarial nets. In ACM\/IEEE Design Automation Conference."}],"event":{"name":"ASPDAC '23: 28th Asia and South Pacific Design Automation Conference","location":"Tokyo Japan","acronym":"ASPDAC '23","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA","IEICE","IEEE CAS","IPSJ"]},"container-title":["Proceedings of the 28th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3567896","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3566097.3567896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T17:36:19Z","timestamp":1767807379000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3567896"}},"subtitle":["ML Model Extraction Attack in EDA"],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":32,"alternative-id":["10.1145\/3566097.3567896","10.1145\/3566097"],"URL":"https:\/\/doi.org\/10.1145\/3566097.3567896","relation":{},"subject":[],"published":{"date-parts":[[2023,1,16]]},"assertion":[{"value":"2023-01-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}