{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T05:21:16Z","timestamp":1769577676933,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T00:00:00Z","timestamp":1673827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The natural science foundation of China","award":["62002030"],"award-info":[{"award-number":["62002030"]}]},{"name":"The development plan project of the Shaanxi Province, China","award":["2019ZDLGY17-08, 2019ZDLGY03-09-01, 2019GY-006, 2020GY-013"],"award-info":[{"award-number":["2019ZDLGY17-08, 2019ZDLGY03-09-01, 2019GY-006, 2020GY-013"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,16]]},"DOI":"10.1145\/3566097.3567910","type":"proceedings-article","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T18:40:49Z","timestamp":1675190449000},"page":"296-301","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["SLOGAN"],"prefix":"10.1145","author":[{"given":"Junchi","family":"Ma","sequence":"first","affiliation":[{"name":"Chang'an University, Xi'an, Shaanxi Province, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sulei","family":"Huang","sequence":"additional","affiliation":[{"name":"Chang'an University, Xi'an, Shaanxi Province, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zongtao","family":"Duan","sequence":"additional","affiliation":[{"name":"Chang'an University, Xi'an, Shaanxi Province, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lei","family":"Tang","sequence":"additional","affiliation":[{"name":"Chang'an University, Xi'an, Shaanxi Province, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Luyang","family":"Wang","sequence":"additional","affiliation":[{"name":"Chang'an University, Xi'an, Shaanxi Province, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"88","volume-title":"Exploiting temporal data diversity for detecting safety-critical faults in AV compute systems,\" in IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"Jha S","year":"2022","unstructured":"Jha S, Cui S, and Tsai T. \"Exploiting temporal data diversity for detecting safety-critical faults in AV compute systems,\" in IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 88--100, IEEE, 2022."},{"key":"e_1_3_2_1_2_1","volume-title":"Silent data corruptions at scale,\" arXiv preprint arXiv:2102.11245","author":"Dixit H. D.","year":"2021","unstructured":"Dixit H. D., Pendharkar S. and Beadon M.. \"Silent data corruptions at scale,\" arXiv preprint arXiv:2102.11245, 2021."},{"key":"e_1_3_2_1_3_1","first-page":"41","volume-title":"Li G and Erez M. \"Evaluating compiler ir-level selective instruction duplication with realistic hardware errors,\" in 9th Workshop on Fault Tolerance for HPC at eXtreme Scale (FTXS)","author":"Chang C K","year":"2019","unstructured":"Chang C K, Li G and Erez M. \"Evaluating compiler ir-level selective instruction duplication with realistic hardware errors,\" in 9th Workshop on Fault Tolerance for HPC at eXtreme Scale (FTXS), pp. 41--49, IEEE, 2019."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-018-0592-y"},{"key":"e_1_3_2_1_5_1","volume-title":"ACM","author":"Li Z","year":"2021","unstructured":"Li Z, Menon H, and Mohror K. \"Understanding a program's resiliency through error propagation,\" in ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP), pp. 362--373, ACM, 2021."},{"key":"e_1_3_2_1_6_1","volume-title":"ACM","author":"Pusz O","year":"2021","unstructured":"Pusz O, Christian D, and Daniel L. \"Data-flow-sensitive fault-space pruning for the injection of transient hardware faults,\" in International Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES), pp. 97--109, ACM, 2021."},{"key":"e_1_3_2_1_7_1","first-page":"168","volume-title":"Lu Q and Pattabiraman K. \"ePVF: An enhanced program vulnerability factor methodology for cross-layer resilience analysis,\" in Dependable Systems and Networks (DSN)","author":"Fang B","year":"2016","unstructured":"Fang B, Lu Q and Pattabiraman K. \"ePVF: An enhanced program vulnerability factor methodology for cross-layer resilience analysis,\" in Dependable Systems and Networks (DSN), pp. 168--179, IEEE, 2016."},{"key":"e_1_3_2_1_8_1","first-page":"94","volume-title":"Storage and Analysis (SC)","author":"Guo L","year":"2018","unstructured":"Guo L, Li D and Laguna I. \"Fliptracker: Understanding natural error resilience in HPC applications,\" in International Conference for High Performance Computing, Networking, Storage and Analysis (SC), pp. 94--107, IEEE, 2018."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2021.02.015"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"Architecture and Synthesis for Embedded Systems (CASES)","author":"Lu Q","year":"2014","unstructured":"Lu Q, Pattabiraman K, and Gupta M S. \"SDCTune: a model for predicting the SDC proneness of an application for configurable protection,\" in International Conference on Compilers, Architecture and Synthesis for Embedded Systems (CASES), pp. 1--10, ACM, 2014."},{"key":"e_1_3_2_1_11_1","first-page":"27","volume-title":"Pattabiraman K and Hari S K S. \"Modeling soft-error propagation in programs,\" in IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"Li G","year":"2018","unstructured":"Li G, Pattabiraman K and Hari S K S. \"Modeling soft-error propagation in programs,\" in IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 27--38, IEEE, 2018."},{"key":"e_1_3_2_1_12_1","first-page":"117","volume-title":"Eliminating microarchitectural dependency from architectural vulnerability,\" in International Symposium on High Performance Computer Architecture (HPCA)","author":"Sridharan V","year":"2009","unstructured":"Sridharan V and Kaeli D R. \"Eliminating microarchitectural dependency from architectural vulnerability,\" in International Symposium on High Performance Computer Architecture (HPCA), pp. 117--128, IEEE, 2009."},{"key":"e_1_3_2_1_13_1","volume-title":"ACM","author":"Hamilton W L","year":"2017","unstructured":"Hamilton W L, Ying Z and Leskovec J. \"Inductive representation learning on large graphs,\" in International Conference on Neural Information Processing Systems (NIPS), pp. 1025--1035, ACM, 2017."},{"key":"e_1_3_2_1_14_1","volume-title":"ACM","author":"Li Y","year":"2019","unstructured":"Li Y, Wang S and Nguyen T N. \"Improving bug detection via context-based code representation learning and attention-based neural networks,\" in Proceedings of the ACM on Programming Languages (OOPSLA), pp. 1--30, ACM, 2019."},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Storage and Analysis (SC)","author":"Rahman M H","year":"2021","unstructured":"Rahman M H, Shamji A and Guo S. \"PEPPA-X: finding program test inputs to bound silent data corruption vulnerability in HPC applications,\" in International Conference for High Performance Computing, Networking, Storage and Analysis (SC), pp. 1--13, ACM, 2021."},{"key":"e_1_3_2_1_16_1","first-page":"75","volume-title":"LLVM: A compilation framework for lifelong program analysis & transformation,\" in International Symposium on Code Generation and Optimization (CGO)","author":"Lattner C","year":"2004","unstructured":"Lattner C and Adve V. \"LLVM: A compilation framework for lifelong program analysis & transformation,\" in International Symposium on Code Generation and Optimization (CGO), pp. 75--86, IEEE, 2004."},{"key":"e_1_3_2_1_17_1","first-page":"11","volume-title":"Reliability and Security (QRS)","author":"Lu Q","year":"2015","unstructured":"Lu Q, Farahani M and Wei J. \"LLFI: An intermediate code-level fault injection tool for hardware faults, \" in International Conference on Software Quality, Reliability and Security (QRS), pp. 11--16, IEEE, 2015."}],"event":{"name":"ASPDAC '23: 28th Asia and South Pacific Design Automation Conference","location":"Tokyo Japan","acronym":"ASPDAC '23","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA","IEICE","IEEE CAS","IPSJ"]},"container-title":["Proceedings of the 28th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3567910","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3566097.3567910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T17:34:56Z","timestamp":1767807296000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3567910"}},"subtitle":["SDC Probability Estimation Using Structured Graph Attention Network"],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":17,"alternative-id":["10.1145\/3566097.3567910","10.1145\/3566097"],"URL":"https:\/\/doi.org\/10.1145\/3566097.3567910","relation":{},"subject":[],"published":{"date-parts":[[2023,1,16]]},"assertion":[{"value":"2023-01-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}