{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T04:14:31Z","timestamp":1767845671331,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T00:00:00Z","timestamp":1706659200000},"content-version":"vor","delay-in-days":380,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["2202310"],"award-info":[{"award-number":["2202310"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,16]]},"DOI":"10.1145\/3566097.3568355","type":"proceedings-article","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T18:40:49Z","timestamp":1675190449000},"page":"598-605","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Robust Hyperdimensional Computing against Cyber Attacks and Hardware Errors"],"prefix":"10.1145","author":[{"given":"Dongning","family":"Ma","sequence":"first","affiliation":[{"name":"Villanova University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sizhe","family":"Zhang","sequence":"additional","affiliation":[{"name":"Villanova University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xun","family":"Jiao","sequence":"additional","affiliation":[{"name":"Villanova University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534359"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3128501"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIOCAS.2018.8584751"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-020-01634-y"},{"key":"e_1_3_2_1_5_1","volume-title":"The isolet spoken letter database","author":"Cole Ron","year":"1990","unstructured":"Ron Cole, Yeshwant Muthusamy, and Mark Fanty. The isolet spoken letter database, 1990."},{"key":"e_1_3_2_1_6_1","volume-title":"Hdlock: Exploiting privileged encoding to protect hyperdimensional computing models against ip stealing. arXiv preprint arXiv:2203.09681","author":"Duan Shijin","year":"2022","unstructured":"Shijin Duan, Shaolei Ren, and Xiaolin Xu. Hdlock: Exploiting privileged encoding to protect hyperdimensional computing models against ip stealing. arXiv preprint arXiv:2203.09681, 2022."},{"key":"e_1_3_2_1_7_1","first-page":"151","volume-title":"NDSS","volume":"8","author":"Godefroid Patrice","year":"2008","unstructured":"Patrice Godefroid, Michael Y Levin, David A Molnar, et al. Automated whitebox fuzz testing. In NDSS, volume 8, pages 151--166, 2008."},{"issue":"14","key":"e_1_3_2_1_8_1","first-page":"527","article-title":"Network simulations with the ns-3 simulator","volume":"14","author":"Henderson Thomas R","year":"2008","unstructured":"Thomas R Henderson, Mathieu Lacage, George F Riley, Craig Dowell, and Joseph Kopena. Network simulations with the ns-3 simulator. SIGCOMM demonstration, 14(14):527, 2008.","journal-title":"SIGCOMM demonstration"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586217"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICAS48895.2020.9073871"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMW52921.2022.9779291"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRC.2017.8123650"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.28"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-009-9009-8"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01360"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218493"},{"key":"e_1_3_2_1_17_1","first-page":"115","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Kim Yeseong","year":"2020","unstructured":"Yeseong Kim, Mohsen Imani, Niema Moshiri, and Tajana Rosing. Geniehd: Efficient dna pattern matching accelerator using hyperdimensional computing. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 115--120. IEEE, 2020."},{"key":"e_1_3_2_1_18_1","volume-title":"ACM Computing Surveys (CSUR)","author":"Kleyko Denis","year":"2021","unstructured":"Denis Kleyko, Dmitri A Rachkovskij, Evgeny Osipov, and Abbas Rahimi. A survey on hyperdimensional computing aka vector symbolic architectures, part i: Models and data transformations. ACM Computing Surveys (CSUR), 2021."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2016.7838428"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531761"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586169"},{"key":"e_1_3_2_1_22_1","volume-title":"IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","author":"Ma Dongning","year":"2022","unstructured":"Dongning Ma, Rahul Thapa, and Xun Jiao. Molehd: Drug discovery using brain-inspired hyperdimensional computing. IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2022."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/HSI55341.2022.9869459"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524067"},{"key":"e_1_3_2_1_25_1","first-page":"1","volume-title":"Design, automation test in Europe conference exhibition (DATE)","author":"Najafabadi Fateme Rasti","year":"2016","unstructured":"Fateme Rasti Najafabadi, Abbas Rahimi, Pentti Kanerva, and Jan M Rabaey. Hyperdimensional computing for text classification. In Design, automation test in Europe conference exhibition (DATE), University Booth, pages 1--1, 2016."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13218-019-00623-z"},{"key":"e_1_3_2_1_27_1","volume-title":"Max M Shulaker, and Subhasish Mitra. Hyperdimensional computing nanosystem. arXiv preprint arXiv:1811.09557","author":"Rahimi Abbas","year":"2018","unstructured":"Abbas Rahimi, Tony F Wu, Haitong Li, Jan M Rabaey, H-S Philip Wong, Max M Shulaker, and Subhasish Mitra. Hyperdimensional computing nanosystem. arXiv preprint arXiv:1811.09557, 2018."},{"key":"e_1_3_2_1_28_1","volume-title":"Reliability issues in computing system design. ACM Computing Surveys (CSUR), 10(2):123--165","author":"Randell Brian","year":"1978","unstructured":"Brian Randell, Pete Lee, and Philip C. Treleaven. Reliability issues in computing system design. ACM Computing Surveys (CSUR), 10(2):123--165, 1978."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.32"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI51109.2021.00026"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI51109.2021.00027"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12664"},{"key":"e_1_3_2_1_33_1","first-page":"298","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Wang Ruixuan","year":"2022","unstructured":"Ruixuan Wang and Xun Jiao. Poisonhd: poison attack on brain-inspired hyperdimensional computing. In 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 298--303. IEEE, 2022."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530395"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS52030.2021.00052"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378532"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2018.2870560"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2018.8310399"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65745-1_22"},{"key":"e_1_3_2_1_40_1","volume-title":"2022 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE","author":"Zhang Sizhe","year":"2022","unstructured":"Sizhe Zhang, Mohsen Imani, and Xun Jiao. Scalehd: Robust brain-inspired hyperdimensional computing via adapative scaling. In 2022 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 2022."},{"key":"e_1_3_2_1_41_1","first-page":"52","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Zhang Sizhe","year":"2022","unstructured":"Sizhe Zhang, Ruixuan Wang, Dongning Ma, Jeff Jun Zhang, Xunzhao Yin, and Xun Jiao. Energy-efficient brain-inspired hyperdimensional computing using voltage scaling. In 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 52--55. IEEE, 2022."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP52443.2021.00039"}],"event":{"name":"ASPDAC '23: 28th Asia and South Pacific Design Automation Conference","location":"Tokyo Japan","acronym":"ASPDAC '23","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA","IEICE","IEEE CAS","IPSJ"]},"container-title":["Proceedings of the 28th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3568355","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3566097.3568355","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3566097.3568355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T17:35:37Z","timestamp":1767807337000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3568355"}},"subtitle":["A Survey"],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":42,"alternative-id":["10.1145\/3566097.3568355","10.1145\/3566097"],"URL":"https:\/\/doi.org\/10.1145\/3566097.3568355","relation":{},"subject":[],"published":{"date-parts":[[2023,1,16]]},"assertion":[{"value":"2023-01-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}