{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:48:30Z","timestamp":1773193710370,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":117,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,11]],"date-time":"2023-11-11T00:00:00Z","timestamp":1699660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Sciences and Engineering Research Council of Canada (NSERC)"},{"DOI":"10.13039\/100019827","name":"Meta","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100019827","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Union?s Horizon 2020 research and innovation programme","award":["956123"],"award-info":[{"award-number":["956123"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,12]]},"DOI":"10.1145\/3581784.3607084","type":"proceedings-article","created":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T21:47:06Z","timestamp":1699998426000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Structural Coding: A Low-Cost Scheme to Protect CNNs from Large-Granularity Memory Faults"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7193-075X","authenticated-orcid":false,"given":"Ali","family":"Asgari Khoshouyeh","sequence":"first","affiliation":[{"name":"Univeristy of British Columbia, Vancouver, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9776-9603","authenticated-orcid":false,"given":"Florian","family":"Geissler","sequence":"additional","affiliation":[{"name":"Intel Corporation, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7124-1835","authenticated-orcid":false,"given":"Syed","family":"Qutub","sequence":"additional","affiliation":[{"name":"Intel Corporation, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9241-5806","authenticated-orcid":false,"given":"Michael","family":"Paulitsch","sequence":"additional","affiliation":[{"name":"Intel Corporation, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1732-4314","authenticated-orcid":false,"given":"Prashant","family":"Nair","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2380-3415","authenticated-orcid":false,"given":"Karthik","family":"Pattabiraman","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. DDR4 SDRAM EDY4016A - 256Mb x16. https:\/\/www.micron.com\/-\/media\/client\/global\/documents\/products\/data-sheet\/dram\/ddr4\/4gb_ddr4_dram_2e0d.pdf. Accessed: 2021-11-16.  [n. d.]. DDR4 SDRAM EDY4016A - 256Mb x16. https:\/\/www.micron.com\/-\/media\/client\/global\/documents\/products\/data-sheet\/dram\/ddr4\/4gb_ddr4_dram_2e0d.pdf. Accessed: 2021-11-16."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Ddr5 Sdram. https:\/\/www.micron.com\/products\/dram\/ddr5-sdram. Accessed: 2021-11-16.  [n. d.]. Ddr5 Sdram. https:\/\/www.micron.com\/products\/dram\/ddr5-sdram. Accessed: 2021-11-16."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. Linux. Perf. https:\/\/perf.wiki.kernel.org\/index.php\/Main_Page. Accessed: 2022-07-15.  [n. d.]. Linux. Perf. https:\/\/perf.wiki.kernel.org\/index.php\/Main_Page. Accessed: 2022-07-15."},{"key":"e_1_3_2_1_4_1","unstructured":"2004. Uprating Semiconductors for High-Temperature Applications. https:\/\/www.micron.com\/about\/blog\/2022\/february\/mobileye-advances-automotive-autonomy. Accessed: 2022-11-22.  2004. Uprating Semiconductors for High-Temperature Applications. https:\/\/www.micron.com\/about\/blog\/2022\/february\/mobileye-advances-automotive-autonomy. Accessed: 2022-11-22."},{"key":"e_1_3_2_1_5_1","unstructured":"2004. Uprating Semiconductors for High-Temperature Applications. https:\/\/www.micron.com\/-\/media\/client\/global\/documents\/products\/technical-note\/dram\/tn0018.pdf. Accessed: 2022-11-22.  2004. Uprating Semiconductors for High-Temperature Applications. https:\/\/www.micron.com\/-\/media\/client\/global\/documents\/products\/technical-note\/dram\/tn0018.pdf. Accessed: 2022-11-22."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. ISO 26262: Road vehicles --- Functional safety. https:\/\/www.iso.org\/standard\/68383.html. Accessed: 2022-11-22.  2018. ISO 26262: Road vehicles --- Functional safety. https:\/\/www.iso.org\/standard\/68383.html. Accessed: 2022-11-22."},{"key":"e_1_3_2_1_7_1","unstructured":"2022. EyeQ\u00ae: The System-on-Chip for Automotive Applications. https:\/\/www.mobileye.com\/technology\/eyeq-chip\/. Accessed: 2022-11-22.  2022. EyeQ\u00ae: The System-on-Chip for Automotive Applications. https:\/\/www.mobileye.com\/technology\/eyeq-chip\/. Accessed: 2022-11-22."},{"key":"e_1_3_2_1_8_1","unstructured":"2022. Intel Products Home. https:\/\/ark.intel.com\/content\/www\/us\/en\/ark\/search\/featurefilter.html?productType=873&0_StatusCodeText1=3 4. Accessed: 2022-06-22.  2022. Intel Products Home. https:\/\/ark.intel.com\/content\/www\/us\/en\/ark\/search\/featurefilter.html?productType=873&0_StatusCodeText1=3 4. Accessed: 2022-06-22."},{"key":"e_1_3_2_1_9_1","unstructured":"2022. System Power Calculators. https:\/\/www.micron.com\/support\/tools-and-utilities\/power-calc. Accessed: 2022-11-22.  2022. System Power Calculators. https:\/\/www.micron.com\/support\/tools-and-utilities\/power-calc. Accessed: 2022-11-22."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3076716"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3017211"},{"key":"e_1_3_2_1_12_1","volume-title":"Luk","author":"Anfinson Cynthia J.","year":"1988","unstructured":"Cynthia J. Anfinson and Franklin T . Luk . 1988 . A linear algebraic model of algorithm-based fault tolerance. In IEEE Transactions on Computers, Vol. 37 . Ieee , 1599--1604. Cynthia J. Anfinson and Franklin T. Luk. 1988. A linear algebraic model of algorithm-based fault tolerance. In IEEE Transactions on Computers, Vol. 37. Ieee, 1599--1604."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2019.05.008"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRPS.2015.7112832"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071066"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12094332"},{"key":"e_1_3_2_1_17_1","volume-title":"Automated Hardening of Deep Neural Network Architectures. In ASME International Mechanical Engineering Congress and Exposition","volume":"85697","author":"Beyer Michael","year":"2021","unstructured":"Michael Beyer , Christoph Schorn , Tagir Fabarisov , Andrey Morozov , and Klaus Janschek . 2021 . Automated Hardening of Deep Neural Network Architectures. In ASME International Mechanical Engineering Congress and Exposition , Vol. 85697 . American Society of Mechanical Engineers, V013t14a046. Michael Beyer, Christoph Schorn, Tagir Fabarisov, Andrey Morozov, and Klaus Janschek. 2021. Automated Hardening of Deep Neural Network Architectures. In ASME International Mechanical Engineering Congress and Exposition, Vol. 85697. American Society of Mechanical Engineers, V013t14a046."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9260(91)90040-R"},{"key":"e_1_3_2_1_19_1","volume-title":"High speed computing II","author":"Brent Richard P","unstructured":"Richard P Brent , Franklin T Luk , and Cynthia J Anfinson . 1989. Choosing small weights for multiple error detection . In High speed computing II , Vol. 1058 . International Society for Optics and Photonics , 130--137. Richard P Brent, Franklin T Luk, and Cynthia J Anfinson. 1989. Choosing small weights for multiple error detection. In High speed computing II, Vol. 1058. International Society for Optics and Photonics, 130--137."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818950.2818961"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654059.1654089"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428831_15"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00018"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317908"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/sc.2004.12"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"e_1_3_2_1_27_1","volume-title":"IBM Microelectronics division","author":"Dell Timothy J","unstructured":"Timothy J Dell . 1997. A white paper on the benefits of chipkill-correct ECC for PC server main memory . In IBM Microelectronics division , Vol. 11 . 1--23. Timothy J Dell. 1997. A white paper on the benefits of chipkill-correct ECC for PC server main memory. In IBM Microelectronics division, Vol. 11. 1--23."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.62"},{"key":"e_1_3_2_1_30_1","volume-title":"IEEE Transactions on Reliability","volume":"68","author":"dos Santos Fernando Fernandes","year":"2018","unstructured":"Fernando Fernandes dos Santos , Pedro Foletto Pimenta , Caio Lunardi , Lucas Draghetti , Luigi Carro , David Kaeli , and Paolo Rech . 2018 . Analyzing and increasing the reliability of convolutional neural networks on GPUs . In IEEE Transactions on Reliability , Vol. 68 . Ieee, 663--677. Fernando Fernandes dos Santos, Pedro Foletto Pimenta, Caio Lunardi, Lucas Draghetti, Luigi Carro, David Kaeli, and Paolo Rech. 2018. Analyzing and increasing the reliability of convolutional neural networks on GPUs. In IEEE Transactions on Reliability, Vol. 68. Ieee, 663--677."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/edcc51268.2020.00016"},{"key":"e_1_3_2_1_32_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 786--789","author":"Feng Xianglong","year":"2021","unstructured":"Xianglong Feng , Mengmei Ye , Ke Xia , and Sheng Wei . 2021 . Runtime Fault Injection Detection for FPGA-based DNN Execution Using Siamese Path Verification. In 2021 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 786--789 . Xianglong Feng, Mengmei Ye, Ke Xia, and Sheng Wei. 2021. Runtime Fault Injection Detection for FPGA-based DNN Execution Using Siamese Path Verification. In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 786--789."},{"key":"e_1_3_2_1_33_1","volume-title":"Dram reliability: Aging analysis and reliability prediction model","author":"Fieback Moritz","unstructured":"Moritz Fieback . 2017. Dram reliability: Aging analysis and reliability prediction model . http:\/\/resolver.tudelft.nl\/uuid:e36c2de7-a8d3-4dfa-9da1-ac5b7e18614b. Accessed: 2023-02-28. Moritz Fieback. 2017. Dram reliability: Aging analysis and reliability prediction model. http:\/\/resolver.tudelft.nl\/uuid:e36c2de7-a8d3-4dfa-9da1-ac5b7e18614b. Accessed: 2023-02-28."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00090"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424287"},{"key":"e_1_3_2_1_36_1","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Guan Hui","year":"2019","unstructured":"Hui Guan , Lin Ning , Zhen Lin , Xipeng Shen , Huiyang Zhou , and Seung Hwan Lim . 2019 . In-place zero-space memory protection for CNN . In Advances in Neural Information Processing Systems , Vol. 32 . Hui Guan, Lin Ning, Zhen Lin, Xipeng Shen, Huiyang Zhou, and Seung Hwan Lim. 2019. In-place zero-space memory protection for CNN. In Advances in Neural Information Processing Systems, Vol. 32."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2021.3117150"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2021.3063083"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.01410"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 4729--4737","author":"He Zecheng","year":"2019","unstructured":"Zecheng He , Tianwei Zhang , and Ruby Lee . 2019 . Sensitive-sample finger-printing of deep neural networks . In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 4729--4737 . Zecheng He, Tianwei Zhang, and Ruby Lee. 2019. Sensitive-sample finger-printing of deep neural networks. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 4729--4737."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368474.3368476"},{"key":"e_1_3_2_1_43_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1241--1246","author":"Hoang Le-Ha","year":"2020","unstructured":"Le-Ha Hoang , Muhammad Abdullah Hanif , and Muhammad Shafique . 2020 . Ft-clipact: Resilience analysis of deep neural networks and improving their fault tolerance using clipped activation. In 2020 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1241--1246 . Le-Ha Hoang, Muhammad Abdullah Hanif, and Muhammad Shafique. 2020. Ft-clipact: Resilience analysis of deep neural networks and improving their fault tolerance using clipped activation. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1241--1246."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00140"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ita50056.2020.9244998"},{"key":"e_1_3_2_1_46_1","unstructured":"Forrest N Iandola Song Han Matthew W Moskewicz Khalid Ashraf William J Dally and Kurt Keutzer. 2016. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and< 0.5 MB model size. In arXiv preprint arXiv:1602.07360.  Forrest N Iandola Song Han Matthew W Moskewicz Khalid Ashraf William J Dally and Kurt Keutzer. 2016. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and< 0.5 MB model size. In arXiv preprint arXiv:1602.07360."},{"key":"e_1_3_2_1_47_1","unstructured":"JEDEC Standard. 2015. DDR3 Standard. In Jesd79-3e.  JEDEC Standard. 2015. DDR3 Standard. In Jesd79-3e."},{"key":"e_1_3_2_1_48_1","unstructured":"JEDEC Standard. 2015. DDR4 Standard. In Jesd79-4.  JEDEC Standard. 2015. DDR4 Standard. In Jesd79-4."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503243"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503243"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2013.6522325"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177754"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056025"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807591.2807659"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476184"},{"key":"e_1_3_2_1_56_1","volume-title":"Weinberger (Eds.)","volume":"25","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey E Hinton . 2012 . ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q . Weinberger (Eds.) , Vol. 25 . Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper\/ 2012\/file\/c399862d3b9d6b76c8436e924a68c45b-Paper.pdf Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger (Eds.), Vol. 25. Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper\/2012\/file\/c399862d3b9d6b76c8436e924a68c45b-Paper.pdf"},{"key":"e_1_3_2_1_57_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 724--729","author":"Lee Seo-Seok","year":"2022","unstructured":"Seo-Seok Lee and Joon-Sung Yang . 2022 . Value-aware parity insertion ECC for fault-tolerant deep neural network. In 2022 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 724--729 . Seo-Seok Lee and Joon-Sung Yang. 2022. Value-aware parity insertion ECC for fault-tolerant deep neural network. In 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 724--729."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2018.00046"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126964"},{"key":"e_1_3_2_1_60_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 790--795","author":"Li Jingtao","year":"2021","unstructured":"Jingtao Li , Adnan Siraj Rakin , Zhezhi He , Deliang Fan , and Chaitali Chakrabarti . 2021 . Radar: Run-time adversarial weight attack detection and accuracy recovery. In 2021 Design , Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 790--795 . Jingtao Li, Adnan Siraj Rakin, Zhezhi He, Deliang Fan, and Chaitali Chakrabarti. 2021. Radar: Run-time adversarial weight attack detection and accuracy recovery. In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 790--795."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/dac18072.2020.9218665"},{"key":"e_1_3_2_1_62_1","volume-title":"USENIX Annual Technical Conference. 275--280","author":"Li Xin","year":"2007","unstructured":"Xin Li , Kai Shen , Michael C Huang , and Lingkun Chu . 2007 . A Memory Soft Error Measurement on Production Systems .. In USENIX Annual Technical Conference. 275--280 . Xin Li, Kai Shen, Michael C Huang, and Lingkun Chu. 2007. A Memory Soft Error Measurement on Production Systems.. In USENIX Annual Technical Conference. 275--280."},{"key":"e_1_3_2_1_63_1","volume-title":"Tutorial: Complexity analysis of singular value decomposition and its variants. In arXiv preprint arXiv:1906.12085.","author":"Li Xiaocan","year":"2019","unstructured":"Xiaocan Li , Shuo Wang , and Yinghao Cai . 2019 . Tutorial: Complexity analysis of singular value decomposition and its variants. In arXiv preprint arXiv:1906.12085. Xiaocan Li, Shuo Wang, and Yinghao Cai. 2019. Tutorial: Complexity analysis of singular value decomposition and its variants. In arXiv preprint arXiv:1906.12085."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359831"},{"key":"e_1_3_2_1_65_1","volume-title":"IEEE Transactions on Nuclear Science","volume":"66","author":"Libano Fabiano","year":"2018","unstructured":"Fabiano Libano , Brittany Wilson , J Anderson , Michael J Wirthlin , Carlo Cazzaniga , Christopher Frost , and Paolo Rech . 2018 . Selective hardening for neural networks in FPGAs . In IEEE Transactions on Nuclear Science , Vol. 66 . Ieee, 216--222. Fabiano Libano, Brittany Wilson, J Anderson, Michael J Wirthlin, Carlo Cazzaniga, Christopher Frost, and Paolo Rech. 2018. Selective hardening for neural networks in FPGAs. In IEEE Transactions on Nuclear Science, Vol. 66. Ieee, 216--222."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415726"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITherm45881.2020.9190321"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_8"},{"key":"e_1_3_2_1_69_1","volume-title":"Christopher W Fletcher, Sarita V Adve, Charbel Sakr, Naresh R Shanbhag, Pavlo Molchanov, Michael B Sullivan, Timothy Tsai, and Stephen W Keckler.","author":"Mahmoud Abdulrahman","year":"2021","unstructured":"Abdulrahman Mahmoud , Siva Kumar Sastry Hari , Christopher W Fletcher, Sarita V Adve, Charbel Sakr, Naresh R Shanbhag, Pavlo Molchanov, Michael B Sullivan, Timothy Tsai, and Stephen W Keckler. 2021 . Optimizing Selective Protection for CNN Resilience.. In ISSRE. 127--138. Abdulrahman Mahmoud, Siva Kumar Sastry Hari, Christopher W Fletcher, Sarita V Adve, Charbel Sakr, Naresh R Shanbhag, Pavlo Molchanov, Michael B Sullivan, Timothy Tsai, and Stephen W Keckler. 2021. Optimizing Selective Protection for CNN Resilience.. In ISSRE. 127--138."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874254"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.23919\/date.2018.8342023"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394885.3431519"},{"key":"e_1_3_2_1_73_1","volume-title":"Essentials of error-control coding","author":"Moreira Jorge Casti\u00f1eira","unstructured":"Jorge Casti\u00f1eira Moreira and Patrick Guy Farrell . 2006. Essentials of error-control coding . John Wiley & Sons . Jorge Casti\u00f1eira Moreira and Patrick Guy Farrell. 2006. Essentials of error-control coding. John Wiley & Sons."},{"key":"e_1_3_2_1_74_1","volume-title":"International Conference on Complex Networks and Their Applications. Springer, 928--940","author":"Mozafari Marzieh","year":"2019","unstructured":"Marzieh Mozafari , Reza Farahbakhsh , and Noel Crespi . 2019 . A BERT-based transfer learning approach for hate speech detection in online social media . In International Conference on Complex Networks and Their Applications. Springer, 928--940 . Marzieh Mozafari, Reza Farahbakhsh, and Noel Crespi. 2019. A BERT-based transfer learning approach for hate speech detection in online social media. In International Conference on Complex Networks and Their Applications. Springer, 928--940."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001174"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/dac18074.2021.9586112"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830804"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460288"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480069"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415680"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-020-05920-2"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477007"},{"key":"e_1_3_2_1_83_1","volume-title":"PyTorch: An Imperative Style","author":"Paszke Adam","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , Luca Antiga , Alban Desmaison , Andreas Kopf , Edward Yang , Zachary DeVito , Martin Raison , Alykhan Tejani , Sasank Chilamkurthy , Benoit Steiner , Lu Fang , Junjie Bai , and Soumith Chintala . 2019. PyTorch: An Imperative Style , High-Performance Deep Learning Library . In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 8024--8035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 8024--8035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS53633.2021.9614303"},{"key":"e_1_3_2_1_85_1","volume-title":"DRAMA: Exploiting DRAM addressing for cross-cpu attacks. In 25th {USENIX$}$ security symposium (${$USENIX$}$ security 16). 565--581.","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl , Daniel Gruss , Cl\u00e9mentine Maurice , Michael Schwarz , and Stefan Mangard . 2016 . DRAMA: Exploiting DRAM addressing for cross-cpu attacks. In 25th {USENIX$}$ security symposium (${$USENIX$}$ security 16). 565--581. Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM addressing for cross-cpu attacks. In 25th {USENIX$}$ security symposium (${$USENIX$}$ security 16). 565--581."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00024"},{"key":"e_1_3_2_1_87_1","volume-title":"Robustness of neural networks against storage media errors. arXiv preprint arXiv:1709.06173","author":"Qin Minghai","year":"2017","unstructured":"Minghai Qin , Chao Sun , and Dejan Vucinic . 2017. Robustness of neural networks against storage media errors. arXiv preprint arXiv:1709.06173 ( 2017 ). Minghai Qin, Chao Sun, and Dejan Vucinic. 2017. Robustness of neural networks against storage media errors. arXiv preprint arXiv:1709.06173 (2017)."},{"key":"e_1_3_2_1_88_1","volume-title":"Renato De Mori, and Yoshua Bengio","author":"Ravanelli Mirco","year":"2021","unstructured":"Mirco Ravanelli , Titouan Parcollet , Peter Plantinga , Aku Rouhe , Samuele Cornell , Loren Lugosch , Cem Subakan , Nauman Dawalatabad , Abdelwahab Heba , Jianyuan Zhong , Ju-Chieh Chou , Sung-Lin Yeh , Szu-Wei Fu , Chien-Feng Liao , Elena Rastorgueva , Fran\u00e7ois Grondin , William Aris , Hwidong Na , Yan Gao , Renato De Mori, and Yoshua Bengio . 2021 . SpeechBrain: A General-Purpose Speech Toolkit . arXiv:2106.04624 [eess.AS] arXiv:2106.04624. Mirco Ravanelli, Titouan Parcollet, Peter Plantinga, Aku Rouhe, Samuele Cornell, Loren Lugosch, Cem Subakan, Nauman Dawalatabad, Abdelwahab Heba, Jianyuan Zhong, Ju-Chieh Chou, Sung-Lin Yeh, Szu-Wei Fu, Chien-Feng Liao, Elena Rastorgueva, Fran\u00e7ois Grondin, William Aris, Hwidong Na, Yan Gao, Renato De Mori, and Yoshua Bengio. 2021. SpeechBrain: A General-Purpose Speech Toolkit. arXiv:2106.04624 [eess.AS] arXiv:2106.04624."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174480"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04898-2_616"},{"key":"e_1_3_2_1_91_1","volume-title":"Proceedings of the Great Lakes Symposium on VLSI","author":"Rios Marco","year":"2022","unstructured":"Marco Rios , Flavio Ponzina , Giovanni Ansaloni , Alexandre Levisse , and David Atienza . 2022 . Error Resilient In-Memory Computing Architecture for CNN Inference on the Edge . In Proceedings of the Great Lakes Symposium on VLSI 2022. 249--254. Marco Rios, Flavio Ponzina, Giovanni Ansaloni, Alexandre Levisse, and David Atienza. 2022. Error Resilient In-Memory Computing Architecture for CNN Inference on the Edge. In Proceedings of the Great Lakes Symposium on VLSI 2022. 249--254."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/IV48863.2021.9575602"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04969-6"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.23919\/date.2019.8714885"},{"key":"e_1_3_2_1_95_1","volume-title":"Fair Scheduling in High Performance Computing Environments","author":"Sedighi Art","unstructured":"Art Sedighi and Milton Smith . 2019. Financial Market Risk . In Fair Scheduling in High Performance Computing Environments . Springer , 7--15. Art Sedighi and Milton Smith. 2019. Financial Market Risk. In Fair Scheduling in High Performance Computing Environments. Springer, 7--15."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/dft.2017.8244428"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/iiswc.2018.8573527"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/dsn.2013.6575309"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.21437\/Odyssey.2018-15"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8525361"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694348"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.5555\/2388996.2389100"},{"key":"e_1_3_2_1_103_1","volume-title":"Characterizing and Mitigating Soft Errors in GPU DRAM. In MICRO-54: 54th Annual IEEE\/ACM International Symposium on Microarchitecture. 641--653","author":"Sullivan Michael B","year":"2021","unstructured":"Michael B Sullivan , Nirmal Saxena , Mike O'Connor , Donghyuk Lee , Paul Racunas , Saurabh Hukerikar , Timothy Tsai , Siva Kumar Sastry Hari , and Stephen W Keckler . 2021 . Characterizing and Mitigating Soft Errors in GPU DRAM. In MICRO-54: 54th Annual IEEE\/ACM International Symposium on Microarchitecture. 641--653 . Michael B Sullivan, Nirmal Saxena, Mike O'Connor, Donghyuk Lee, Paul Racunas, Saurabh Hukerikar, Timothy Tsai, Siva Kumar Sastry Hari, and Stephen W Keckler. 2021. Characterizing and Mitigating Soft Errors in GPU DRAM. In MICRO-54: 54th Annual IEEE\/ACM International Symposium on Microarchitecture. 641--653."},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2015.7298594"},{"key":"e_1_3_2_1_105_1","unstructured":"Dahong Tang and Weimin Zhang. 2007. A Sub-matrix Method For Multiple Reed-solomon Erasure Coding.  Dahong Tang and Weimin Zhang. 2007. A Sub-matrix Method For Multiple Reed-solomon Erasure Coding."},{"key":"e_1_3_2_1_106_1","volume-title":"Tools for High Performance Computing","author":"Terpstra Dan","year":"2009","unstructured":"Dan Terpstra , Heike Jagode , Haihang You , and Jack Dongarra . 2010. Collecting Performance Data with PAPI-C . In Tools for High Performance Computing 2009 , Matthias S. M\u00fcller, Michael M. Resch, Alexander Schulz, and Wolfgang E. Nagel (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 157--173. Dan Terpstra, Heike Jagode, Haihang You, and Jack Dongarra. 2010. Collecting Performance Data with PAPI-C. In Tools for High Performance Computing 2009, Matthias S. M\u00fcller, Michael M. Resch, Alexander Schulz, and Wolfgang E. Nagel (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 157--173."},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337192"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/isca.2012.6237025"},{"key":"e_1_3_2_1_109_1","volume-title":"Proc. Non-Volatile Memories Workshop.","author":"Upadhyaya Pulakesh","year":"2019","unstructured":"Pulakesh Upadhyaya , Xiaojing Yu , Jacob Mink , Jeffrey Cordero , Palash Parmar , and A Jiang . 2019 . Error correction for hardware-implemented deep neural networks . In Proc. Non-Volatile Memories Workshop. Pulakesh Upadhyaya, Xiaojing Yu, Jacob Mink, Jeffrey Cordero, Palash Parmar, and A Jiang. 2019. Error correction for hardware-implemented deep neural networks. In Proc. Non-Volatile Memories Workshop."},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3182659"},{"key":"e_1_3_2_1_111_1","unstructured":"Jonathan Walker. 2016. Peak Car Ownership: The Market Opportunity Of Electric Automated Mobility Servicesthe Market Opportunity Of Electric Automated Mobility Services. https:\/\/rmi.org\/insight\/peak-car-ownership-report\/. Accessed: 2021-11-01.  Jonathan Walker. 2016. Peak Car Ownership: The Market Opportunity Of Electric Automated Mobility Servicesthe Market Opportunity Of Electric Automated Mobility Services. https:\/\/rmi.org\/insight\/peak-car-ownership-report\/. Accessed: 2021-11-01."},{"key":"e_1_3_2_1_112_1","unstructured":"P. Warden. 2018. Speech Commands: A Dataset for Limited-Vocabulary Speech Recognition. In ArXiv e-prints. arXiv:1804.03209 [cs.CL] https:\/\/arxiv.org\/abs\/1804.03209  P. Warden. 2018. Speech Commands: A Dataset for Limited-Vocabulary Speech Recognition. In ArXiv e-prints. arXiv:1804.03209 [cs.CL] https:\/\/arxiv.org\/abs\/1804.03209"},{"key":"e_1_3_2_1_113_1","volume-title":"Inverting modified matrices","author":"Woodbury Max A","unstructured":"Max A Woodbury . 1950. Inverting modified matrices . Statistical Research Group . Max A Woodbury. 1950. Inverting modified matrices. Statistical Research Group."},{"key":"e_1_3_2_1_114_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Yao Fan","year":"2020","unstructured":"Fan Yao , Adnan Siraj Rakin , and Deliang Fan . 2020 . Deephammer: Depleting the intelligence of deep neural networks through targeted chain of bit flips . In 29th USENIX Security Symposium (USENIX Security 20) . 1463--1480. Fan Yao, Adnan Siraj Rakin, and Deliang Fan. 2020. Deephammer: Depleting the intelligence of deep neural networks through targeted chain of bit flips. In 29th USENIX Security Symposium (USENIX Security 20). 1463--1480."},{"key":"e_1_3_2_1_115_1","unstructured":"Jianbo Ye Xin Lu Zhe Lin and James Z Wang. 2018. Rethinking the smaller-norm-less-informative assumption in channel pruning of convolution layers. In arXiv preprint arXiv:1802.00124.  Jianbo Ye Xin Lu Zhe Lin and James Z Wang. 2018. Rethinking the smaller-norm-less-informative assumption in channel pruning of convolution layers. In arXiv preprint arXiv:1802.00124."},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736064"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2020.3043449"}],"event":{"name":"SC '23: International Conference for High Performance Computing, Networking, Storage and Analysis","location":"Denver CO USA","acronym":"SC '23","sponsor":["SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing","IEEE CS"]},"container-title":["Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581784.3607084","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581784.3607084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:23Z","timestamp":1750178183000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581784.3607084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,11]]},"references-count":117,"alternative-id":["10.1145\/3581784.3607084","10.1145\/3581784"],"URL":"https:\/\/doi.org\/10.1145\/3581784.3607084","relation":{},"subject":[],"published":{"date-parts":[[2023,11,11]]},"assertion":[{"value":"2023-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}