{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:08Z","timestamp":1750309508174,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T00:00:00Z","timestamp":1719100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61975124","62202288"],"award-info":[{"award-number":["61975124","62202288"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,23]]},"DOI":"10.1145\/3649329.3655981","type":"proceedings-article","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T19:27:22Z","timestamp":1731007642000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["EOS: An Energy-Oriented Attack Framework for Spiking Neural Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6964-8910","authenticated-orcid":false,"given":"Ning","family":"Yang","sequence":"first","affiliation":[{"name":"the Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai, China"},{"name":"Shanghai Qi Zhi Institute, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8769-293X","authenticated-orcid":false,"given":"Fangxin","family":"Liu","sequence":"additional","affiliation":[{"name":"the Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, Shanghai, China"},{"name":"Shanghai Qi Zhi Institute, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2157-4927","authenticated-orcid":false,"given":"Zongwu","family":"Wang","sequence":"additional","affiliation":[{"name":"the Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2939-6534","authenticated-orcid":false,"given":"Haomin","family":"Li","sequence":"additional","affiliation":[{"name":"the Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6494-4786","authenticated-orcid":false,"given":"Zhuoran","family":"Song","sequence":"additional","affiliation":[{"name":"the Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0810-1458","authenticated-orcid":false,"given":"Songwen","family":"Pei","sequence":"additional","affiliation":[{"name":"the Computer Science and Engineering Department, University of Shanghai for Science and Technology, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7353-8798","authenticated-orcid":false,"given":"Li","family":"Jiang","sequence":"additional","affiliation":[{"name":"the Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, Shanghai, China"},{"name":"Shanghai Qi Zhi Institute, Shanghai, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Arnon Amir et al. 2017. A low power fully event-based gesture recognition system. In CVPR. 7243--7252.","DOI":"10.1109\/CVPR.2017.781"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. IEEE","author":"Alessandro","year":"2012","unstructured":"Alessandro Barenghi et al. 2012. Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures. Proc. IEEE (2012)."},{"key":"e_1_3_2_1_3_1","unstructured":"Wei Fang et al. 2020. SpikingJelly. https:\/\/github.com\/fangwei123456\/spikingjelly."},{"key":"e_1_3_2_1_4_1","volume-title":"Wei et al","author":"Fang Zhaofei Yu","year":"2021","unstructured":"Zhaofei Yu Fang, Wei et al. 2021. Incorporating learnable membrane time constant to enhance learning of spiking neural networks. In ICCV."},{"key":"e_1_3_2_1_5_1","volume-title":"Spiking deep networks with LIF neurons. arXiv","author":"Hunsberger Eric","year":"2015","unstructured":"Eric Hunsberger and Chris Eliasmith. 2015. Spiking deep networks with LIF neurons. arXiv (2015)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Yoongu Kim et al. 2014. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors. ACM SIGARCH CAN (2014).","DOI":"10.1109\/ISCA.2014.6853210"},{"key":"e_1_3_2_1_7_1","volume-title":"Neuroengine: A hardware-based event-driven simulation system for advanced brain-inspired computing. In ASPLOS.","author":"Hunjun Lee","year":"2021","unstructured":"Hunjun Lee et al. 2021. Neuroengine: A hardware-based event-driven simulation system for advanced brain-inspired computing. In ASPLOS."},{"key":"e_1_3_2_1_8_1","unstructured":"Jeong-Jun Lee Wenrui Zhang and Peng Li. 2022. Parallel time batching: Systolic-array acceleration of sparse spiking neural computation. In HPCA."},{"key":"e_1_3_2_1_9_1","unstructured":"Ling Liang et al. 2021. Exploring adversarial attack in spiking neural networks with spike-compatible gradient. TNNLS (2021)."},{"key":"e_1_3_2_1_10_1","volume-title":"SSTDP: Supervised Spike Timing Dependent Plasticity for Efficient Spiking Neural Network Training. Frontiers in Neuroscience","author":"Fangxin Liu","year":"2020","unstructured":"Fangxin Liu et al. 2020. SSTDP: Supervised Spike Timing Dependent Plasticity for Efficient Spiking Neural Network Training. Frontiers in Neuroscience (2020)."},{"key":"e_1_3_2_1_11_1","unstructured":"Fangxin Liu et al. 2022. Sato: spiking neural network acceleration via temporal-oriented dataflow and architecture. In DAC."},{"key":"e_1_3_2_1_12_1","volume-title":"Spikeconverter: An efficient conversion framework zipping the gap between artificial neural networks and spiking neural networks. In AAAI.","author":"Fangxin Liu","year":"2022","unstructured":"Fangxin Liu et al. 2022. Spikeconverter: An efficient conversion framework zipping the gap between artificial neural networks and spiking neural networks. In AAAI."},{"key":"e_1_3_2_1_13_1","volume-title":"Dvs-attacks: Adversarial attacks on dynamic vision sensors for spiking neural networks. In IJCNN.","author":"Alberto Marchisio","year":"2021","unstructured":"Alberto Marchisio et al. 2021. Dvs-attacks: Adversarial attacks on dynamic vision sensors for spiking neural networks. In IJCNN."},{"key":"e_1_3_2_1_14_1","volume-title":"SCANN: Side Channel Analysis of Spiking Neural Networks. Cryptography","author":"Karthikeyan Nagarajan","year":"2023","unstructured":"Karthikeyan Nagarajan et al. 2023. SCANN: Side Channel Analysis of Spiking Neural Networks. Cryptography (2023)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Surya Narayanan et al. 2020. SpinalFlow: an architecture and dataflow tailored for spiking neural networks. In ISCA. IEEE.","DOI":"10.1109\/ISCA45697.2020.00038"},{"key":"e_1_3_2_1_16_1","volume-title":"T-bfa: Targeted bit-flip adversarial weight attack. TPMAI","author":"Rakin Adnan Siraj","year":"2021","unstructured":"Adnan Siraj Rakin et al. 2021. T-bfa: Targeted bit-flip adversarial weight attack. TPMAI (2021)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Nitin Rathi et al. 2021. Exploring Spike-Based Learning for Neuromorphic Computing: Prospects and Perspectives. In DATE.","DOI":"10.23919\/DATE51398.2021.9473964"},{"key":"e_1_3_2_1_18_1","unstructured":"Kaveh Razavi et al. 2016. Flip feng shui: Hammering a needle in the software stack. In USENIX Security."},{"key":"e_1_3_2_1_19_1","unstructured":"Kaushik Roy et al. 2019. Towards spike-based machine intelligence with neuromorphic computing. Nature (2019)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Abhronil Sengupta et al. 2019. Going deeper in spiking neural networks: VGG and residual architectures. Frontiers in neuroscience (2019).","DOI":"10.3389\/fnins.2019.00095"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Saima Sharmin et al. 2019. A comprehensive analysis on adversarial robustness of spiking neural networks. In IJCNN. 1--8.","DOI":"10.1109\/IJCNN.2019.8851732"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Sonali Singh et al. 2020. NEBULA: a neuromorphic spin-based ultra-low power architecture for SNNs and ANNs. In ISCA. IEEE.","DOI":"10.1109\/ISCA45697.2020.00039"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Yun Xiang et al. 2020. Open dnn box by power side-channel attack. TCAS II (2020).","DOI":"10.1109\/TCSII.2020.2973007"},{"key":"e_1_3_2_1_24_1","unstructured":"Mengjia Yan et al. 2020. Cache telepathy: Leveraging shared resource attacks to learn {DNN} architectures. In USENIX Security."}],"event":{"name":"DAC '24: 61st ACM\/IEEE Design Automation Conference","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"San Francisco CA USA","acronym":"DAC '24"},"container-title":["Proceedings of the 61st ACM\/IEEE Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3655981","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649329.3655981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:55Z","timestamp":1750295875000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3655981"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,23]]},"references-count":24,"alternative-id":["10.1145\/3649329.3655981","10.1145\/3649329"],"URL":"https:\/\/doi.org\/10.1145\/3649329.3655981","relation":{},"subject":[],"published":{"date-parts":[[2024,6,23]]},"assertion":[{"value":"2024-11-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}