{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:54:00Z","timestamp":1762869240705,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":105,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":372,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1822949, CCF-2119184, CNS-1764039, CISE-ANR-2124393"],"award-info":[{"award-number":["CCF-1822949, CCF-2119184, CNS-1764039, CISE-ANR-2124393"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3623069","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"1123-1137","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9372-9622","authenticated-orcid":false,"given":"Tejas","family":"Kannan","sequence":"first","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9315-5201","authenticated-orcid":false,"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0816-8150","authenticated-orcid":false,"given":"Henry","family":"Hoffmann","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation. 265--283","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. 2016a. TensorFlow: A system for Large-Scale machine learning. In 12th USENIX Symposium on Operating Systems Design and Implementation. 265--283."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_3_1","volume-title":"5th Turkish Artificial Intelligence and Artificial Neural Networks Symposium. Citeseer.","author":"Alimoglu Fevzi","year":"1996","unstructured":"Fevzi Alimoglu and Ethem Alpaydin. 1996. Methods of combining multiple classifiers based on different representations for pen-based handwritten digit recognition. In 5th Turkish Artificial Intelligence and Artificial Neural Networks Symposium. Citeseer."},{"key":"e_1_3_2_1_4_1","volume-title":"21st International European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. 437--442","author":"Anguita Davide","year":"2013","unstructured":"Davide Anguita, Alessandro Ghio, Luca Oneto, Xavier Parra Perez, and Jorge Luis Reyes Ortiz. 2013. A public domain dataset for human activity recognition using smartphones. In 21st International European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. 437--442."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0040"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467078"},{"key":"e_1_3_2_1_8_1","volume-title":"28th USENIX Security Symposium. 515--532","author":"Batina Lejla","year":"2019","unstructured":"Lejla Batina, Shivam Bhasin, Dirmanto Jap, and Stjepan Picek. 2019. CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel. In 28th USENIX Security Symposium. 515--532."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30484-3_26"},{"key":"e_1_3_2_1_10_1","unstructured":"Erik Bernhardsson. 2023. Annoy. https:\/\/github.com\/spotify\/annoy."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090583.1648610"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665949"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.20"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Gregory Cohen Saeed Afshar Jonathan Tapson and Andr\u00e9 van Schaik. 2017. EMNIST: an extension of MNIST to handwritten letters. arXiv:1702.05373.","DOI":"10.1109\/IJCNN.2017.7966217"},{"key":"e_1_3_2_1_18_1","unstructured":"Joan Daemen and Vincent Rijmen. 1999. AES proposal: Rijndael. (1999)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873594"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378473"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50053-X"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1110"},{"key":"e_1_3_2_1_24_1","volume-title":"International Conf. on Machine Learning. PMLR, 201--210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conf. on Machine Learning. PMLR, 201--210."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304011"},{"key":"e_1_3_2_1_26_1","volume-title":"International Conf. on Learning Representations.","author":"Goodfellow Ian J","year":"2015","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. In International Conf. on Learning Representations."},{"key":"e_1_3_2_1_27_1","unstructured":"Tianyu Gu Brendan Dolan-Gavitt and Siddharth Garg. 2017. BadNets: Identifying vulnerabilities in the machine learning model supply chain. arXiv:1708.06733."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446747"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01427"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480112"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobihealth.2014.257440"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0010(199802)76:2<263::AID-JSFA943>3.0.CO;2-F"},{"key":"e_1_3_2_1_34_1","volume-title":"Ionuct -Vlad Modoranu, and Tudor Dumitracs.","author":"Hong Sanghyun","year":"2020","unstructured":"Sanghyun Hong, Yiug itcan Kaya, Ionuct -Vlad Modoranu, and Tudor Dumitracs. 2020. A panda? No, it's a sloth: Slowdown attacks on adaptive multi-exit neural network inference. arXiv:2010.02432."},{"key":"e_1_3_2_1_35_1","unstructured":"Ting-Kuei Hu Tianlong Chen Haotao Wang and Zhangyang Wang. 2020. Triple wins: Boosting accuracy robustness and efficiency together by enabling input-adaptive inference. arXiv:2002.10025."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196105"},{"key":"e_1_3_2_1_37_1","volume-title":"Laurens Van Der Maaten, and Kilian Q Weinberger","author":"Huang Gao","year":"2017","unstructured":"Gao Huang, Danlu Chen, Tianhong Li, Felix Wu, Laurens Van Der Maaten, and Kilian Q Weinberger. 2017. Multi-scale dense networks for resource efficient image classification. arXiv:1703.09844."},{"key":"e_1_3_2_1_38_1","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Ilyas Andrew","year":"2019","unstructured":"Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, and Aleksander Madry. 2019. Adversarial examples are not bugs, they are features. Advances in Neural Information Processing Systems, Vol. 32 (2019)."},{"key":"e_1_3_2_1_39_1","unstructured":"Texas Instruments. 2020. TI MSP430 EnergyTrace Technology. https:\/\/www.ti.com\/lit\/ug\/slau157as\/slau157as.pdf. Accessed: 04-2023."},{"key":"e_1_3_2_1_40_1","unstructured":"Texas Instruments. 2021. TI MSP430 FR5994 Datasheet. https:\/\/www.ti.com\/lit\/ds\/symlink\/msp430fr5994.pdf. Accessed: 04-2023."},{"key":"e_1_3_2_1_41_1","unstructured":"Zohar Jackson. 2022. Free spoken digit dataset. https:\/\/github.com\/Jakobovski\/free-spoken-digit-dataset. Accessed: 04-2023."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482335"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605408"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.146"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3093337.3037698"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Tejas Kannan Nick Feamster and Henry Hoffmann. 2023. Prediction privacy in distributed multi-exit neural networks: Vulnerabilities and solutions. https:\/\/github.com\/tejaskannan\/privacy-dnn-early-exit\/blob\/master\/dnn_early_exit_privacy_extended.pdf.","DOI":"10.1145\/3576915.3623069"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507775"},{"key":"e_1_3_2_1_49_1","volume-title":"International Conf. on Machine Learning. PMLR, 3301--3310","author":"Kaya Yigitcan","year":"2019","unstructured":"Yigitcan Kaya, Sanghyun Hong, and Tudor Dumitras. 2019. Shallow-deep networks: Understanding and mitigating network overthinking. In International Conf. on Machine Learning. PMLR, 3301--3310."},{"key":"e_1_3_2_1_50_1","volume-title":"Adam: A method for stochastic optimization. arXiv:1412.6980.","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv:1412.6980."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_1_52_1","volume-title":"International Conf. on Machine Learning. PMLR, 5637--5664","author":"Koh Pang Wei","year":"2021","unstructured":"Pang Wei Koh, Shiori Sagawa, Henrik Marklund, Sang Michael Xie, Marvin Zhang, Akshay Balsubramani, Weihua Hu, Michihiro Yasunaga, Richard Lanas Phillips, Irena Gao, et al. 2021. Wilds: A benchmark of in-the-wild distribution shifts. In International Conf. on Machine Learning. PMLR, 5637--5664."},{"key":"e_1_3_2_1_53_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.3390\/e19110631"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964897.1964918"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419194"},{"key":"e_1_3_2_1_57_1","volume-title":"Nature","volume":"521","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature, Vol. 521, 7553 (2015), 436--444."},{"key":"e_1_3_2_1_58_1","unstructured":"Yann LeCun Corinna Cortes and Chris Burges. 1998. The MNIST database of handwritten digits. http:\/\/yann. lecun. com\/exdb\/mnist\/ (1998)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00044"},{"key":"e_1_3_2_1_60_1","unstructured":"Hankook Lee and Jinwoo Shin. 2018. Anytime neural prediction via slicing networks vertically. arXiv:1807.02609."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2946140"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559359"},{"key":"e_1_3_2_1_63_1","first-page":"11711","article-title":"MCUnet: Tiny deep learning on IoT devices","volume":"33","author":"Lin Ji","year":"2020","unstructured":"Ji Lin, Wei-Ming Chen, Yujun Lin, Chuang Gan, Song Han, et al. 2020. MCUnet: Tiny deep learning on IoT devices. Advances in Neural Information Processing Systems, Vol. 33 (2020), 11711--11722.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_65_1","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570751"},{"key":"e_1_3_2_1_67_1","volume-title":"Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud. In 31st USENIX Security Symposium. USENIX Association","author":"Mehta Aastha","year":"2022","unstructured":"Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Bj\u00f6rn B. Brandenburg, Peter Druschel, and Deepak Garg. 2022. Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud. In 31st USENIX Security Symposium. USENIX Association, Boston, MA, 2819--2838."},{"volume-title":"Investigations of Power Analysis Attacks on Smartcards. In USENIX Workshop on Smartcard Technology. USENIX Association.","author":"Thomas","key":"e_1_3_2_1_68_1","unstructured":"Thomas S. Messerges and Ezzy A. Dabbish. 1999. Investigations of Power Analysis Attacks on Smartcards. In USENIX Workshop on Smartcard Technology. USENIX Association."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388946"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665950"},{"key":"e_1_3_2_1_72_1","unstructured":"Angela Orebaugh Gilbert Ramirez and Jay Beale. 2006. Wireshark & Ethereal network protocol analyzer toolkit. Elsevier."},{"key":"e_1_3_2_1_73_1","volume-title":"31st USENIX Security Symposium. 3611--3628","author":"Pan Xudong","year":"2022","unstructured":"Xudong Pan, Mi Zhang, Beina Sheng, Jiaming Zhu, and Min Yang. 2022. Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation. In 31st USENIX Security Symposium. 3611--3628."},{"key":"e_1_3_2_1_74_1","volume-title":"Estimation of entropy and mutual information. Neural computation","author":"Paninski Liam","year":"2003","unstructured":"Liam Paninski. 2003. Estimation of entropy and mutual information. Neural computation, Vol. 15, 6 (2003), 1191--1253."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-020-09734-4"},{"key":"e_1_3_2_1_79_1","volume-title":"Communication theory of secrecy systems. The Bell system technical journal","author":"Shannon Claude E","year":"1949","unstructured":"Claude E Shannon. 1949. Communication theory of secrecy systems. The Bell system technical journal, Vol. 28, 4 (1949), 656--715."},{"key":"e_1_3_2_1_80_1","first-page":"18021","article-title":"Manipulating SGD with data ordering attacks","volume":"34","author":"Shumailov Ilia","year":"2021","unstructured":"Ilia Shumailov, Zakhar Shumaylov, Dmitry Kazhdan, Yiren Zhao, Nicolas Papernot, Murat A Erdogdu, and Ross J Anderson. 2021a. Manipulating SGD with data ordering attacks. Advances in Neural Information Processing Systems, Vol. 34 (2021), 18021--18032.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00024"},{"key":"e_1_3_2_1_82_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2670313"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"e_1_3_2_1_85_1","volume-title":"31st USENIX Security Symposium. 1379--1395","author":"Stevens Timothy","year":"2022","unstructured":"Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, and Joseph Near. 2022. Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors. In 31st USENIX Security Symposium. 1379--1395."},{"key":"e_1_3_2_1_86_1","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv:1312.6199."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7900006"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.226"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"e_1_3_2_1_90_1","volume-title":"Transferring Adversarial Robustness Through Robust Representation Matching. In 31st USENIX Security Symposium. 2083--2098","author":"Vaishnavi Pratik","year":"2022","unstructured":"Pratik Vaishnavi, Kevin Eykholt, and Amir Rahmati. 2022. Transferring Adversarial Robustness Through Robust Representation Matching. In 31st USENIX Security Symposium. 2083--2098."},{"key":"e_1_3_2_1_91_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation. 515--529","author":"Vasisht Deepak","year":"2017","unstructured":"Deepak Vasisht, Zerina Kapetanovic, Jongho Won, Xinxin Jin, Ranveer Chandra, Sudipta Sinha, Ashish Kapoor, Madhusudhan Sudarshan, and Sean Stratman. 2017. FarmBeats: An IoT platform for data-driven agriculture. In 14th USENIX Symposium on Networked Systems Design and Implementation. 515--529."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_1"},{"key":"e_1_3_2_1_93_1","volume-title":"International Conf. on Machine Learning. PMLR, 9807--9817","author":"Wan Chengcheng","year":"2020","unstructured":"Chengcheng Wan, Henry Hoffmann, Shan Lu, and Michael Maire. 2020a. Orthogonalized SGD and nested architectures for anytime neural networks. In International Conf. on Machine Learning. PMLR, 9807--9817."},{"key":"e_1_3_2_1_94_1","volume-title":"USENIX Annual Technical Conf. 353--369","author":"Wan Chengcheng","year":"2020","unstructured":"Chengcheng Wan, Muhammad Santriaji, Eri Rogers, Henry Hoffmann, Michael Maire, and Shan Lu. 2020b. ALERT: Accurate learning for energy and timeliness. In USENIX Annual Technical Conf. 353--369."},{"key":"e_1_3_2_1_95_1","unstructured":"Xin Wang Yujia Luo Daniel Crankshaw Alexey Tumanov Fisher Yu and Joseph E Gonzalez. 2017. Idk cascades: Fast deep learning by learning not to overthink. arXiv:1706.00885."},{"key":"e_1_3_2_1_96_1","unstructured":"Pete Warden. 2018. Speech commands: A dataset for limited-vocabulary speech recognition. arXiv:1804.03209."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274696"},{"key":"e_1_3_2_1_99_1","volume-title":"Theoretical and practical aspects of military wireless sensor networks. Journal of Telecommunications and Information Technology","author":"Winkler Michael","year":"2008","unstructured":"Michael Winkler, Klaus-Dieter Tuchs, Kester Hughes, and Graeme Barclay. 2008. Theoretical and practical aspects of military wireless sensor networks. Journal of Telecommunications and Information Technology (2008), 37--45."},{"key":"e_1_3_2_1_100_1","unstructured":"Han Xiao Kashif Rasul and Roland Vollgraf. 2017. Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms. arXiv:1708.07747."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131675"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274783.3274837"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300274"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800506"},{"key":"e_1_3_2_1_105_1","first-page":"18330","article-title":"Bert loses patience: Fast and robust inference with early exit","volume":"33","author":"Zhou Wangchunshu","year":"2020","unstructured":"Wangchunshu Zhou, Canwen Xu, Tao Ge, Julian McAuley, Ke Xu, and Furu Wei. 2020. Bert loses patience: Fast and robust inference with early exit. Advances in Neural Information Processing Systems, Vol. 33 (2020), 18330--18341.","journal-title":"Advances in Neural Information Processing Systems"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623069","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623069","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:46:23Z","timestamp":1755740783000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":105,"alternative-id":["10.1145\/3576915.3623069","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3623069","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}