{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T18:20:03Z","timestamp":1777141203293,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CCF1909963,CCF2211163,CNS2120396,CNS2304766,CNS2145389,CNS2120276,CCF2000480,CCF2028873,CNS2120350"],"award-info":[{"award-number":["CCF1909963,CCF2211163,CNS2120396,CNS2304766,CNS2145389,CNS2120276,CCF2000480,CCF2028873,CNS2120350"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3582820","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"274-285","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Secure and Efficient Mobile DNN Using Trusted Execution Environments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8009-374X","authenticated-orcid":false,"given":"Bin","family":"Hu","sequence":"first","affiliation":[{"name":"Rutgers University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3984-6973","authenticated-orcid":false,"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"Temple University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3968-9699","authenticated-orcid":false,"given":"Jerry","family":"Cheng","sequence":"additional","affiliation":[{"name":"New York Institute of Technology, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1177-6897","authenticated-orcid":false,"given":"Tianming","family":"Zhao","sequence":"additional","affiliation":[{"name":"Dayton University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5830-6625","authenticated-orcid":false,"given":"Yucheng","family":"Xie","sequence":"additional","affiliation":[{"name":"Indiana University Purdue University Indianapolis, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5001-5636","authenticated-orcid":false,"given":"Xiaonan","family":"Guo","sequence":"additional","affiliation":[{"name":"George Mason University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3994-766X","authenticated-orcid":false,"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Rutgers University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2188385.2188395"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00061"},{"key":"e_1_3_2_1_3_1","volume-title":"Intel sgx explained.IACR Cryptol. ePrint Arch","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016. Intel sgx explained.IACR Cryptol. ePrint Arch . 2016 , 86 (2016), 1\u2013118. Victor Costan and Srinivas Devadas. 2016. Intel sgx explained.IACR Cryptol. ePrint Arch. 2016, 86 (2016), 1\u2013118."},{"key":"e_1_3_2_1_4_1","volume-title":"Enabling smart retail settings via mobile augmented reality shopping apps. Technological forecasting and social change 124","author":"Dacko G","year":"2017","unstructured":"Scott\u00a0 G Dacko . 2017. Enabling smart retail settings via mobile augmented reality shopping apps. Technological forecasting and social change 124 ( 2017 ), 243\u2013256. Scott\u00a0G Dacko. 2017. Enabling smart retail settings via mobile augmented reality shopping apps. Technological forecasting and social change 124 (2017), 243\u2013256."},{"key":"e_1_3_2_1_5_1","unstructured":"Tim Dettmers and Luke Zettlemoyer. 2020. Sparse Networks from Scratch: Faster Training without Losing Performance. https:\/\/openreview.net\/forum?id=ByeSYa4KPS  Tim Dettmers and Luke Zettlemoyer. 2020. Sparse Networks from Scratch: Faster Training without Losing Performance. https:\/\/openreview.net\/forum?id=ByeSYa4KPS"},{"key":"e_1_3_2_1_6_1","volume-title":"HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment. In 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1\u20136.","author":"Gangal Akshay","year":"2020","unstructured":"Akshay Gangal , Mengmei Ye , and Sheng Wei . 2020 . HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment. In 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1\u20136. Akshay Gangal, Mengmei Ye, and Sheng Wei. 2020. HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment. In 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1\u20136."},{"key":"e_1_3_2_1_7_1","volume-title":"Understanding database reconstruction attacks on public data. Commun. ACM 62, 3","author":"Garfinkel Simson","year":"2019","unstructured":"Simson Garfinkel , John\u00a0 M Abowd , and Christian Martindale . 2019. Understanding database reconstruction attacks on public data. Commun. ACM 62, 3 ( 2019 ). Simson Garfinkel, John\u00a0M Abowd, and Christian Martindale. 2019. Understanding database reconstruction attacks on public data. Commun. ACM 62, 3 (2019)."},{"key":"e_1_3_2_1_8_1","volume-title":"What every computer scientist should know about floating-point arithmetic. ACM computing surveys (CSUR) 23, 1","author":"Goldberg David","year":"1991","unstructured":"David Goldberg . 1991. What every computer scientist should know about floating-point arithmetic. ACM computing surveys (CSUR) 23, 1 ( 1991 ), 5\u201348. David Goldberg. 1991. What every computer scientist should know about floating-point arithmetic. ACM computing surveys (CSUR) 23, 1 (1991), 5\u201348."},{"key":"e_1_3_2_1_9_1","volume-title":"Privado: Practical and secure DNN inference with enclaves. arXiv preprint arXiv:1810.00602","author":"Grover Karan","year":"2018","unstructured":"Karan Grover , Shruti Tople , Shweta Shinde , Ranjita Bhagwan , and Ramachandran Ramjee . 2018 . Privado: Practical and secure DNN inference with enclaves. arXiv preprint arXiv:1810.00602 (2018). Karan Grover, Shruti Tople, Shweta Shinde, Ranjita Bhagwan, and Ramachandran Ramjee. 2018. Privado: Practical and secure DNN inference with enclaves. arXiv preprint arXiv:1810.00602 (2018)."},{"key":"e_1_3_2_1_10_1","volume-title":"Confidential inference via ternary model partitioning. arXiv preprint arXiv:1807.00969","author":"Gu Zhongshu","year":"2018","unstructured":"Zhongshu Gu , Heqing Huang , Jialong Zhang , Dong Su , Hani Jamjoom , Ankita Lamba , Dimitrios Pendarakis , and Ian Molloy . 2018. Confidential inference via ternary model partitioning. arXiv preprint arXiv:1807.00969 ( 2018 ). Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Hani Jamjoom, Ankita Lamba, Dimitrios Pendarakis, and Ian Molloy. 2018. Confidential inference via ternary model partitioning. arXiv preprint arXiv:1807.00969 (2018)."},{"key":"e_1_3_2_1_11_1","article-title":"EIE: Efficient inference engine on compressed deep neural network","volume":"44","author":"Han Song","year":"2016","unstructured":"Song Han , Xingyu Liu , Huizi Mao , Jing Pu , Ardavan Pedram , Mark\u00a0 A Horowitz , and William\u00a0 J Dally . 2016 . EIE: Efficient inference engine on compressed deep neural network . ACM SIGARCH Computer Architecture News 44 , 3 (2016). Song Han, Xingyu Liu, Huizi Mao, Jing Pu, Ardavan Pedram, Mark\u00a0A Horowitz, and William\u00a0J Dally. 2016. EIE: Efficient inference engine on compressed deep neural network. ACM SIGARCH Computer Architecture News 44, 3 (2016).","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"e_1_3_2_1_12_1","volume-title":"Achieving human parity on automatic chinese to english news translation. arXiv preprint arXiv:1803.05567","author":"Hassan Hany","year":"2018","unstructured":"Hany Hassan , Anthony Aue , Chang Chen , Vishal Chowdhary , Jonathan Clark , Christian Federmann , Xuedong Huang , Marcin Junczys-Dowmunt , William Lewis , Mu Li , 2018. Achieving human parity on automatic chinese to english news translation. arXiv preprint arXiv:1803.05567 ( 2018 ). Hany Hassan, Anthony Aue, Chang Chen, Vishal Chowdhary, Jonathan Clark, Christian Federmann, Xuedong Huang, Marcin Junczys-Dowmunt, William Lewis, Mu Li, 2018. Achieving human parity on automatic chinese to english news translation. arXiv preprint arXiv:1803.05567 (2018)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_48"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682336"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"e_1_3_2_1_16_1","volume-title":"2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 1\u20138.","author":"Hou Xueshi","year":"2017","unstructured":"Xueshi Hou , Yao Lu , and Sujit Dey . 2017 . Wireless VR\/AR with edge\/cloud computing . In 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 1\u20138. Xueshi Hou, Yao Lu, and Sujit Dey. 2017. Wireless VR\/AR with edge\/cloud computing. In 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 1\u20138."},{"key":"e_1_3_2_1_17_1","volume-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861","author":"Howard G","year":"2017","unstructured":"Andrew\u00a0 G Howard , Menglong Zhu , Bo Chen , Dmitry Kalenichenko , Weijun Wang , Tobias Weyand , Marco Andreetto , and Hartwig Adam . 2017 . Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017). Andrew\u00a0G Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. 2017. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 (2017)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1194-7"},{"key":"e_1_3_2_1_19_1","volume-title":"2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 1\u20138.","author":"Hu Bin","year":"2021","unstructured":"Bin Hu , Tianming Zhao , Yucheng Xie , Yan Wang , Xiaonan Guo , Jerry Cheng , and Yingying Chen . 2021 . Details omitted for double-blind reviewing . In 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 1\u20138. Bin Hu, Tianming Zhao, Yucheng Xie, Yan Wang, Xiaonan Guo, Jerry Cheng, and Yingying Chen. 2021. Details omitted for double-blind reviewing. In 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 1\u20138."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1080\/1206212X.2019.1619277","article-title":"An efficient approach for enhancing security in Internet of Things using the optimum authentication key","volume":"42","author":"Kalyani G","year":"2020","unstructured":"G Kalyani and Shilpa Chaudhari . 2020 . An efficient approach for enhancing security in Internet of Things using the optimum authentication key . International Journal of Computers and Applications 42 , 3 (2020), 306 \u2013 314 . G Kalyani and Shilpa Chaudhari. 2020. An efficient approach for enhancing security in Internet of Things using the optimum authentication key. International Journal of Computers and Applications 42, 3 (2020), 306\u2013314.","journal-title":"International Journal of Computers and Applications"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419111.3421282"},{"key":"e_1_3_2_1_22_1","unstructured":"Alex Krizhevsky. 2009. Learning multiple layers of features from tiny images. (2009).  Alex Krizhevsky. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_23_1","volume-title":"Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey\u00a0 E Hinton . 2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25 ( 2012 ). Alex Krizhevsky, Ilya Sutskever, and Geoffrey\u00a0E Hinton. 2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25 (2012)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Christian Ledig Lucas Theis Ferenc Husz\u00e1r Jose Caballero Andrew Cunningham Alejandro Acosta Andrew Aitken Alykhan Tejani Johannes Totz Zehan Wang 2017. Photo-realistic single image super-resolution using a generative adversarial network. In CVPR.  Christian Ledig Lucas Theis Ferenc Husz\u00e1r Jose Caballero Andrew Cunningham Alejandro Acosta Andrew Aitken Alykhan Tejani Johannes Totz Zehan Wang 2017. Photo-realistic single image super-resolution using a generative adversarial network. In CVPR.","DOI":"10.1109\/CVPR.2017.19"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"e_1_3_2_1_26_1","unstructured":"Shaohui Lin Rongrong Ji Yuchao Li Yongjian Wu Feiyue Huang and Baochang Zhang. 2018. Accelerating Convolutional Networks via Global & Dynamic Filter Pruning.. In IJCAI.  Shaohui Lin Rongrong Ji Yuchao Li Yongjian Wu Feiyue Huang and Baochang Zhang. 2018. Accelerating Convolutional Networks via Global & Dynamic Filter Pruning.. In IJCAI."},{"key":"e_1_3_2_1_27_1","unstructured":"Shaohui Lin Rongrong Ji Chenqian Yan Baochang Zhang Liujuan Cao Qixiang Ye Feiyue Huang and David Doermann. 2019. Towards optimal structured cnn pruning via generative adversarial learning. In CVPR.  Shaohui Lin Rongrong Ji Chenqian Yan Baochang Zhang Liujuan Cao Qixiang Ye Feiyue Huang and David Doermann. 2019. Towards optimal structured cnn pruning via generative adversarial learning. In CVPR."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Ning Liu Xiaolong Ma Zhiyuan Xu Yanzhi Wang Jian Tang and Jieping Ye. 2020. AutoCompress: An Automatic DNN Structured Pruning Framework for Ultra-High Compression Rates.. In AAAI. 4876\u20134883.  Ning Liu Xiaolong Ma Zhiyuan Xu Yanzhi Wang Jian Tang and Jieping Ye. 2020. AutoCompress: An Automatic DNN Structured Pruning Framework for Ultra-High Compression Rates.. In AAAI. 4876\u20134883.","DOI":"10.1609\/aaai.v34i04.5924"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the International Conference on Internet-of-Things Design and Implementation. 67\u201379","author":"Liu Renju","year":"2021","unstructured":"Renju Liu , Luis Garcia , Zaoxing Liu , Botong Ou , and Mani Srivastava . 2021 . SecDeep: Secure and Performant On-device Deep Learning Inference Framework for Mobile and IoT Devices . In Proceedings of the International Conference on Internet-of-Things Design and Implementation. 67\u201379 . Renju Liu, Luis Garcia, Zaoxing Liu, Botong Ou, and Mani Srivastava. 2021. SecDeep: Secure and Performant On-device Deep Learning Inference Framework for Mobile and IoT Devices. In Proceedings of the International Conference on Internet-of-Things Design and Implementation. 67\u201379."},{"key":"e_1_3_2_1_30_1","volume-title":"Trusted-DNN: A TrustZone-based Adaptive Isolation Strategy for Deep Neural Networks. In ACM Turing Award Celebration Conference-China (ACM TURC","author":"Liu Zhuang","year":"2021","unstructured":"Zhuang Liu , Ye Lu , Xueshuo Xie , Yaozheng Fang , Zhaolong Jian , and Tao Li . 2021 . Trusted-DNN: A TrustZone-based Adaptive Isolation Strategy for Deep Neural Networks. In ACM Turing Award Celebration Conference-China (ACM TURC 2021). Zhuang Liu, Ye Lu, Xueshuo Xie, Yaozheng Fang, Zhaolong Jian, and Tao Li. 2021. Trusted-DNN: A TrustZone-based Adaptive Isolation Strategy for Deep Neural Networks. In ACM Turing Award Celebration Conference-China (ACM TURC 2021)."},{"key":"e_1_3_2_1_31_1","volume-title":"Revisiting small batch training for deep neural networks. arXiv preprint arXiv:1804.07612","author":"Masters Dominic","year":"2018","unstructured":"Dominic Masters and Carlo Luschi . 2018. Revisiting small batch training for deep neural networks. arXiv preprint arXiv:1804.07612 ( 2018 ). Dominic Masters and Carlo Luschi. 2018. Revisiting small batch training for deep neural networks. arXiv preprint arXiv:1804.07612 (2018)."},{"key":"e_1_3_2_1_32_1","volume-title":"Vol.\u00a01","author":"McGillion Brian","unstructured":"Brian McGillion , Tanel Dettenborn , Thomas Nyman , and N Asokan . 2015. Open-TEE\u2013An Open Virtual Trusted Execution Environment. In 2015 IEEE Trustcom\/BigDataSE\/ISPA , Vol.\u00a01 . IEEE , 400\u2013407. Brian McGillion, Tanel Dettenborn, Thomas Nyman, and N Asokan. 2015. Open-TEE\u2013An Open Virtual Trusted Execution Environment. In 2015 IEEE Trustcom\/BigDataSE\/ISPA, Vol.\u00a01. IEEE, 400\u2013407."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"e_1_3_2_1_34_1","volume-title":"A survey on deep neural network compression: Challenges, overview, and solutions. arXiv preprint arXiv:2010.03954","author":"Mishra Rahul","year":"2020","unstructured":"Rahul Mishra , Hari\u00a0Prabhat Gupta , and Tanima Dutta . 2020. A survey on deep neural network compression: Challenges, overview, and solutions. arXiv preprint arXiv:2010.03954 ( 2020 ). Rahul Mishra, Hari\u00a0Prabhat Gupta, and Tanima Dutta. 2020. A survey on deep neural network compression: Challenges, overview, and solutions. arXiv preprint arXiv:2010.03954 (2020)."},{"key":"e_1_3_2_1_35_1","volume-title":"PPFL: privacy-preserving federated learning with trusted execution environments. arXiv preprint arXiv:2104.14380","author":"Mo Fan","year":"2021","unstructured":"Fan Mo , Hamed Haddadi , Kleomenis Katevas , Eduard Marin , Diego Perino , and Nicolas Kourtellis . 2021. PPFL: privacy-preserving federated learning with trusted execution environments. arXiv preprint arXiv:2104.14380 ( 2021 ). Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, and Nicolas Kourtellis. 2021. PPFL: privacy-preserving federated learning with trusted execution environments. arXiv preprint arXiv:2104.14380 (2021)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388946"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0010-5"},{"key":"e_1_3_2_1_38_1","volume-title":"International Conference on Learning Representations.","author":"Mussay Ben","year":"2019","unstructured":"Ben Mussay , Margarita Osadchy , Vladimir Braverman , Samson Zhou , and Dan Feldman . 2019 . Data-independent neural pruning via coresets . In International Conference on Learning Representations. Ben Mussay, Margarita Osadchy, Vladimir Braverman, Samson Zhou, and Dan Feldman. 2019. Data-independent neural pruning via coresets. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378534"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2967734"},{"key":"e_1_3_2_1_42_1","volume-title":"12th USENIX symposium on operating systems design and implementation.","author":"Papadimitriou Antonis","year":"2016","unstructured":"Antonis Papadimitriou , Ranjita Bhagwan , Nishanth Chandran , Ramachandran Ramjee , Andreas Haeberlen , Harmeet Singh , Abhishek Modi , and Saikrishna Badrinarayanan . 2016 . Big data analytics over encrypted datasets with seabed . In 12th USENIX symposium on operating systems design and implementation. Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh, Abhishek Modi, and Saikrishna Badrinarayanan. 2016. Big data analytics over encrypted datasets with seabed. In 12th USENIX symposium on operating systems design and implementation."},{"key":"e_1_3_2_1_43_1","unstructured":"Adityanarayanan Radhakrishnan Caroline Uhler and Mikhail Belkin. 2018. Downsampling leads to Image Memorization in Convolutional Autoencoders. (2018).  Adityanarayanan Radhakrishnan Caroline Uhler and Mikhail Belkin. 2018. Downsampling leads to Image Memorization in Convolutional Autoencoders. (2018)."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision. 1211\u20131220","author":"Rakin Adnan\u00a0Siraj","year":"2019","unstructured":"Adnan\u00a0Siraj Rakin , Zhezhi He , and Deliang Fan . 2019 . Bit-flip attack: Crushing neural network with progressive bit search . In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 1211\u20131220 . Adnan\u00a0Siraj Rakin, Zhezhi He, and Deliang Fan. 2019. Bit-flip attack: Crushing neural network with progressive bit search. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 1211\u20131220."},{"key":"e_1_3_2_1_45_1","unstructured":"Joseph Redmon. 2013\u20132016. Darknet: Open Source Neural Networks in C. http:\/\/pjreddie.com\/darknet\/.  Joseph Redmon. 2013\u20132016. Darknet: Open Source Neural Networks in C. http:\/\/pjreddie.com\/darknet\/."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001139"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414065"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_51_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 ( 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/3298023.3298188"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Yulong Wang Xiaolu Zhang Lingxi Xie Jun Zhou Hang Su Bo Zhang and Xiaolin Hu. 2020. Pruning from Scratch.. In AAAI. 12273\u201312280.  Yulong Wang Xiaolu Zhang Lingxi Xie Jun Zhou Hang Su Bo Zhang and Xiaolin Hu. 2020. Pruning from Scratch.. In AAAI. 12273\u201312280.","DOI":"10.1609\/aaai.v34i07.6910"},{"key":"e_1_3_2_1_55_1","volume-title":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).","author":"Ye Mengmei","year":"2018","unstructured":"Mengmei Ye , Jonathan Sherman , Witawas Srisa-An , and Sheng Wei . 2018 . TZSlicer: Security-aware dynamic program slicing for hardware isolation . In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). Mengmei Ye, Jonathan Sherman, Witawas Srisa-An, and Sheng Wei. 2018. TZSlicer: Security-aware dynamic program slicing for hardware isolation. In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)."},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","author":"Yim Junho","year":"2017","unstructured":"Junho Yim , Donggyu Joo , Jihoon Bae , and Junmo Kim . 2017 . A gift from knowledge distillation: Fast optimization, network minimization and transfer learning . In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Junho Yim, Donggyu Joo, Jihoon Bae, and Junmo Kim. 2017. A gift from knowledge distillation: Fast optimization, network minimization and transfer learning. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition."},{"key":"e_1_3_2_1_57_1","volume-title":"Nisp: Pruning networks using neuron importance score propagation. In CVPR.","author":"Yu Ruichi","year":"2018","unstructured":"Ruichi Yu , Ang Li , Chun-Fu Chen , Jui-Hsin Lai , Vlad\u00a0 I Morariu , Xintong Han , Mingfei Gao , Ching-Yung Lin , and Larry\u00a0 S Davis . 2018 . Nisp: Pruning networks using neuron importance score propagation. In CVPR. Ruichi Yu, Ang Li, Chun-Fu Chen, Jui-Hsin Lai, Vlad\u00a0I Morariu, Xintong Han, Mingfei Gao, Ching-Yung Lin, and Larry\u00a0S Davis. 2018. Nisp: Pruning networks using neuron importance score propagation. In CVPR."},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the European conference on computer vision (ECCV). 365\u2013382","author":"Zhang Dongqing","year":"2018","unstructured":"Dongqing Zhang , Jiaolong Yang , Dongqiangzi Ye , and Gang Hua . 2018 . Lq-nets: Learned quantization for highly accurate and compact deep neural networks . In Proceedings of the European conference on computer vision (ECCV). 365\u2013382 . Dongqing Zhang, Jiaolong Yang, Dongqiangzi Ye, and Gang Hua. 2018. Lq-nets: Learned quantization for highly accurate and compact deep neural networks. In Proceedings of the European conference on computer vision (ECCV). 365\u2013382."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Tianyun Zhang Shaokai Ye Kaiqi Zhang Jian Tang Wujie Wen Makan Fardad and Yanzhi Wang. 2018. A systematic dnn weight pruning framework using alternating direction method of multipliers. In ECCV.  Tianyun Zhang Shaokai Ye Kaiqi Zhang Jian Tang Wujie Wen Makan Fardad and Yanzhi Wang. 2018. A systematic dnn weight pruning framework using alternating direction method of multipliers. In ECCV.","DOI":"10.1007\/978-3-030-01237-3_12"},{"key":"e_1_3_2_1_60_1","unstructured":"Chenglong Zhao Bingbing Ni Jian Zhang Qiwei Zhao Wenjun Zhang and Qi Tian. 2019. Variational convolutional neural network pruning. In CVPR.  Chenglong Zhao Bingbing Ni Jian Zhang Qiwei Zhao Wenjun Zhang and Qi Tian. 2019. Variational convolutional neural network pruning. In CVPR."},{"key":"e_1_3_2_1_61_1","unstructured":"Zhuangwei Zhuang Mingkui Tan Bohan Zhuang Jing Liu Yong Guo Qingyao Wu Junzhou Huang and Jinhui Zhu. 2018. Discrimination-aware channel pruning for deep neural networks. In Advances in Neural Information Processing Systems.  Zhuangwei Zhuang Mingkui Tan Bohan Zhuang Jing Liu Yong Guo Qingyao Wu Junzhou Huang and Jinhui Zhu. 2018. Discrimination-aware channel pruning for deep neural networks. In Advances in Neural Information Processing Systems."}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582820","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3579856.3582820","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:27Z","timestamp":1750182687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582820"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":60,"alternative-id":["10.1145\/3579856.3582820","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3582820","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}